Search Results - (( developing secure based algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- developing secure »
- java segmentation »
- using algorithm »
- secure based »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The proposed ANPR algorithm was based on an open source image processing library called Leptonica and OCR library called Tesseract. …”
Get full text
Get full text
Get full text
Book -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
7
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…This paper highlights our work in developing an enhanced security framework for Bluetooth-based wireless personal area networks (WPANs). …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
12
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
13
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…This paper presents the design and implementation of a symmetrical hybrid based 128 bit key AES-DES algorithm as a security enhancement for live motion image transmission. …”
Conference paper -
15
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…Results confirmed that the proposed method is indeed suitable for security measure in a parking space. Additionally, the algorithms developed in this study are also validated and verified based on three performance measures namely genuine acceptance rate (GAR) for plate as 96% based on registered car plate during exit whilst face GAR of 80% for registered owner or user to be allowed to exit. …”
Get full text
Get full text
Thesis -
16
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Recently the importance of mobile security coincides with the development of mobile computing. …”
Get full text
Get full text
Conference or Workshop Item -
19
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
Get full text
Get full text
Thesis -
20
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article
