Search Results - (( developing network coding algorithm ) OR ( based application using algorithm ))

Refine Results
  1. 1

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding by Mahmoud, Omer, Anwar, Farhat, Salami, Momoh Jimoh Emiyoka

    Published 2007
    “…The obtained results show that the Quasi-Newton based algorithm has better performance as compared to the other two algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Artificial immune network model based controller for vibration suppression of flexible structures by Md. Salleh, Salihatun, Tokhi, M. Osman, Toha, Siti Fauziah

    Published 2010
    “…The AiNet model based controller thus developed shows the capability of the approach with relatively better accuracy in comparison to using real-coded genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2) by Thian, Laah Lean, Al-Saegh, Ali Mohammed, Ramli, K. F., Ibrahim, N. S., Sali, Aduwati, Salman, Mustafa Ismael

    Published 2013
    “…Based on energy efficiency of each modulation and coding scheme (MODCOD) available in Digital Video Broadcasting - Satellite Second Generation (DVB-S2), the EEF algorithm improves a scheduling mechanism of a two-step scheduler by selecting frames to be transmitted next according to “energy efficiency” policy developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12
  13. 13

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
    Get full text
    Get full text
    Get full text
    Book
  14. 14

    A hybrid database encryption algorithm based on reverse string and dynamic key by Abduljabbar, Waleed Khalid, Mohd Jamil, Jastini, Mohd Shaharanee, Izwan Nizal, Ahmed, Waleed K., Ali, Azhar Tareq

    Published 2016
    “…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Neural network-based codebook search for image compression by Bodruzzaman, M., Gupta, R., Karim, M.R., Bodruzzaman, S.

    Published 2000
    “…This paper presents an efficient and fast encoding of still images using feedforward neural network technique for codebook search. The image to be coded is first clustered into a small subset of neighboring images and then the neural network-based encoder is used to find the best matching code sequences in the codebook. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  18. 18

    An Adaptive Error Correction Scheme For Synchronous Digital Hierarchy-Based Wavelength Division Multiplexed Optical Network by Cheah, Cheng Lai

    Published 2007
    “…These errors become essential and more intense in the high-capacity and long-haul wavelength-division multiplexing (WDM) systems. Therefore, the development of a forward error correction (FEC) technique to mitigate errors in WDM optical networks is very relevant and important. …”
    Get full text
    Get full text
    Thesis
  19. 19

    AUTOMATED GUIDED ROBOT (AGR) by Abd Rahim, Mohd Azlan Shah

    Published 2007
    “…The paper describes the network algorithms developed and used in the design process of the AGR including simulations and circuit designs done for the prototype. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Deep learning convolutional neural network algorithms for the early detection and diagnosis of dental caries on periapical radiographs: a systematic review by Musri, Nabila, Christie, Brenda, Ichwan, Solachuddin Jauhari Arief, Cahyanto, Arief

    Published 2021
    “…Deep learning algorithms have broader and more profound layers and are continually being developed, remarkably enhancing their precision in detecting and segmenting objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article