Search Results - ((((detection algorithm) OR (recognition algorithm))) OR (encryption algorithm))
Search alternatives:
- recognition algorithm »
-
1
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…An encrypted malicious traffic is able to evade the detection by IDS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…An encrypted malicious traffic is able to evade the detection by IDS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
5
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
6
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…This paper highlights a novel strategy for online Arabic text recognition using a hybrid Genetic Algorithm (GA) and Harmony Search algorithm (HS). …”
Get full text
Get full text
Article -
7
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
Get full text
Get full text
Get full text
Article -
8
Extremal region selection for MSER detection in food recognition
Published 2021“…The visual analysis of foods on social media by using food recognition algorithm provides valuable insight from the health, cultural and marketing. …”
Get full text
Get full text
Get full text
Article -
9
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
Get full text
Get full text
Conference or Workshop Item -
10
Extremal Region Selection for MSER Detection in Food Recognition
Published 2021“…The visual analysis of foods on social media by using food recognition algorithm provides valuable insight from the health, cultural and marketing. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
Published 2007Get full text
Get full text
Conference or Workshop Item -
12
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
13
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
14
Feature-based face recognition system using utilized artificial neural network
Published 2010Subjects: Get full text
Thesis -
15
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016Subjects: Get full text
Get full text
Get full text
Thesis -
16
Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm
Published 2019“…The detection, recognition and conversion of the characters in an image into a text are called optical character recognition (OCR). …”
Get full text
Get full text
Thesis -
17
Proper noun detection using regex algorithm and rules for malay named entity recognition
Published 2018“…Proper noun detection using regex algorithm and rules for malay named entity recognition by Farid Morsidi…”
Get full text
thesis -
18
Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB
Published 2010“…In this paper, we propose a road sign detection and recognition algorithm for an embedded application. …”
Get full text
Get full text
Conference or Workshop Item -
19
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
20
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis
