Search Results - (( java segmentation using algorithm ) OR ( framework improving encryption algorithm ))
Search alternatives:
- improving encryption »
- framework improving »
- java segmentation »
- using algorithm »
-
1
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
2
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
3
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
6
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The first framework is proposed to compensate for the loss of damaged patches. …”
Get full text
Get full text
Thesis -
8
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
Get full text
Get full text
Get full text
Article -
9
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
10
Access control and classifier-based blockchain technology in e-healthcare applications
Published 2023“…To improve the security of the healthcare framework, a learning classifier is the support vector machine that is used to characterize sensitive and nonsensitive data from e-healthcare information. …”
Book Chapter -
11
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review
Published 2023“…This literature review investigates the evolving tactics and techniques of ransomware attackers, the complexities of ransomware-as-a-service (RaaS) models, and the increased sophistication of encryption algorithms. Furthermore, this literature review examines a diversity of remedial measures, such as practical security measures, incident comeback frameworks, and legal considerations. …”
Get full text
Get full text
Conference or Workshop Item -
12
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
13
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In this thesis, the Spiral Fibonacci is proposed for a permutation function to diffuse bit permutation in improving cryptography algorithm efficiency. Therefore, this research was carried out using an experimental design framework to analyse the proposed block cipher. …”
Get full text
Get full text
Thesis
