Search Results - (( basic data protection algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- protection algorithm »
- java segmentation »
- using algorithm »
- basic data »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
6
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. …”
Get full text
Get full text
Final Year Project -
7
Development of Lightning Protection System (LPS) Designing Tool
Published 2015“…Based on this standard, the data and mathematical equations were obtained to form algorithms whereby it would be used in the software afterwards. …”
Get full text
Get full text
Final Year Project -
8
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
10
-
11
NUMERICAL DIRECTIONAL OVERCURRENT PROTECTION FOR POWER DISTRIBUTION NETWORK
Published 2007“…Some studies have been made to identify several types offaults related to the systems proposed. Every protection systems have three basic components: instrument transformers, relays and circuit breakers. …”
Get full text
Get full text
Final Year Project -
12
-
13
-
14
Robust Image Watermarking Theories and Techniques: A Review
Published 2014“…Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. …”
Get full text
Get full text
Get full text
Article -
15
Enhancement of network security by use machine learning
Published 2019“…The coding is designed in a way that there is an attack of malicious to destroy the data. Because there is a machine-learning scheme in the security, the system have done automatically protect the data and hence the data is recovered at the end of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
Finger vein verification system using repeated line tracking and dimensionality reduction using PCA algorithms with SURF matching
Published 2017“…The result shows that PCA can improve the accuracy of the verification system by reduce the data down into its basic component without much loss of the information…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Financial advisory and management system
Published 2025“…Basic goal tracking functionality is implemented on the Goal Page, with plans to integrate the Days Needed Calculation Algorithm for real-time progress tracking in future iterations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Analysis of watermarking techniques in video
Published 2011“…Basically digital watermarking involves embedding secret symbols known as watermarks within video data which can be used later for copyright detection purposes. …”
Get full text
Get full text
Conference or Workshop Item
