Search Results - ((((reconstruction algorithm) OR (detection algorithm))) OR (encryption algorithm))
Search alternatives:
- reconstruction algorithm »
-
1
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
2
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
3
Message based random variable length key encryption algorithm.
Published 2009“…Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. …”
Get full text
Get full text
Article -
4
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…An encrypted malicious traffic is able to evade the detection by IDS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…An encrypted malicious traffic is able to evade the detection by IDS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
8
Quantitative analysis evaluation of image reconstruction algorithms between digital and analog PET-CT
Published 2023“…Results demonstrate that both OSEM and HYPER DPR reconstruction algorithms in digital PET-CT has greater spatial resolution, increased detection sensitivity and less image noise when compared to analog PET-CT. …”
Get full text
Get full text
Article -
9
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
Get full text
Get full text
Conference or Workshop Item -
10
Image compression and encryption
Published 2003“…In this project, the RC4 encryption algorithm has been used. This project utilized MATLAB Wavelet Toolbox Version 6.5 thoroughly for its implementation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
12
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
13
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
14
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016Subjects: Get full text
Get full text
Get full text
Thesis -
15
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The aim of this study is to propose enhanced algorithms to be used to interpret and reconstruct a sketch, and then to produce a threedimensional model. …”
Get full text
Get full text
Get full text
Thesis -
16
LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO
Published 2010“…By comparing current local correspondence method and discussing their weakness and strength, this research tries to enhance an algorithm to improve previous works to achieve fast detection, less costly and acceptable accuracy to meet the requirement of reconstruction. …”
Get full text
Get full text
Thesis -
17
Analysis on the Effect of Sensor Views in Image Reconstruction Produced by Optical Tomography System Using Charge-Coupled Device
Published 2024Subjects:Article -
18
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Subjects:Article -
19
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
20
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…Most research in ransomware detection focuses on detecting during the encryption and post-attack phase. …”
Get full text
Get full text
Get full text
Article
