Search Results - (( adaptive _ difference encryption algorithm ) OR ( adaptive web different detection algorithm ))
Search alternatives:
-
1
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
Get full text
Get full text
Thesis -
2
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
3
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. …”
Get full text
Get full text
Thesis -
4
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
Published 2007“…It is employed in tasks like face or hand detection and tracking, filtering of objectionable web images, people retrieval in databases and the Internet. …”
Get full text
Get full text
Thesis -
5
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Design and implementation of a deep learning based hand gesture recognition system for Rehabilitation Internet-Of-Things (RIOT) environments using MediaPipe
Published 2025“…The methodology involves the integration of MediaPipe for detecting hand landmarks and adaptive sensitivity algorithms to ensure reliable recognition across different environments, such as varying lighting and hand positions. …”
Get full text
Get full text
Get full text
Article -
11
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
Get full text
Get full text
Get full text
Get full text
Thesis
