Search Results - some contributing ((((function algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
- function algorithm »
- some contributing »
-
1
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
Get full text
Get full text
Conference or Workshop Item -
2
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
3
AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR
Published 2013“…This study shows that this algorithm could add more value to the function of thin blood smear by eliminating the separated processes of detecting and counting parasitemia using two types of blood smears. …”
Get full text
Get full text
Final Year Project -
4
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
Get full text
Get full text
Thesis -
5
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
6
Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system
Published 2024“…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
Get full text
Get full text
Get full text
Article -
7
Online fake news detection algorithm
Published 2017“…Due to the difficulty in preventing and evaluating what does fake news contain prior to publishing it online, if an algorithm is known for detecting fake news, then spreading online fake news wouldn’t exist in the first place, lead this paper to presents an evaluation of the effectiveness of algorithm(s), able to detect and filter to reasonable degree of accuracy what constitute an online fake news. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
11
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…Generally, a large number of features are required to be selected for training purposes. Often some of these features are irrelevant and do not contribute directly to the face detection techniques. …”
Get full text
Get full text
Get full text
Thesis -
12
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This paper presents a contribution to research on norms detection by proposing a technique, which is called the Potential Norms Detection Technique (PNDT). …”
Short Survey -
13
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
Get full text
Get full text
Student Project -
14
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…One of the most fatal diseases nowadays in the world will be cancer. Some hereditary factors, environmental variables, and today's contemporary lifestyle all contribute to the development of cancer. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This paper presents a contribution to research on norms detection by proposing a technique, which is called the Potential Norms Detection Technique (PNDT). …”
Get full text
Get full text
Article -
16
Fuzzy support vector machine based fall detection method for traumatic brain injuries: A new systematic approach of combining fuzzy logic with support vector machine to achieve hig...
Published 2022“…Hence, it became necessary to look for an effective fall detection method based on a combination of Fuzzy Logic (FL) and SVM algorithms so as to reduce false positive alarms and improve accuracy. …”
Get full text
Get full text
Get full text
Article -
17
Structural assessment of damaged and CFRP repaired reinforced concrete beams from experimental modal analysis / Moatasem Mohammed Fayyadh
Published 2012“…Thus in this study, new algorithms based on natural frequencies and mode shapes for damage detection are proposed to overcome some of the shortcomings which are related to reinforced concrete (RC) being a composite and heterogeneous material. …”
Get full text
Get full text
Thesis -
18
-
19
Development of an Isolated Digit Speech Recognition Based on Multilayer Perceptron Model
Published 2004“…A typical or fixed sigmoid function method is used in learning phase. In the recognition phase, an adaptive sigmoid function is employed. …”
Get full text
Get full text
Thesis -
20
Multi-Objective Optimization of Solar Powered Irrigation System by Using Genetic Algorithm
Published 2015“…Initial range of [1; 2] and crossover fraction of 1.0 have majorly contributed to the optimal search parameters. After some tuning to get the best setting, the simulation shows that the fitness function of 3 objectives resulted with 17.4303 kW power output, 15.2355% efficiency and $143,533.10 fiscal savings. …”
Get full text
Get full text
Final Year Project
