Search Results - (( developing frames encryption algorithm ) OR ( java application bayes algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1
  2. 2

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…In this paper, we design a new selective video encryption based on H.264/AVC and AES. In this proposed scheme, instead of encrypting the entire video stream bit by bit, only the I-frames bitstreams are encrypted. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Diagnosis security problems in cloud computing for business cloud by Shakir M., Abubakar A.B., Yousoff Y.B., Sagher A.M., Alkayali H.

    Published 2023
    “…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
    Article