Search Results - (( parallel estimation methods algorithm ) OR ( data protection method algorithm ))*

Refine Results
  1. 1
  2. 2

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Offline on the other hand, is a mode where adaptive algorithms cannot estimate the imperfections in parallel with the transmission. …”
    Get full text
    Get full text
    Thesis
  3. 3

    State-of-the-art in techniques of text digital watermarking: challenges and limitations by Al-Maweri, Nasr Addin Ahmed Salem, Ali, Roslizah, Wan Adnan, Wan Azizun, Ramli, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah

    Published 2016
    “…Various types of data, including images, videos, audio and text documents, have given cause for the development of different methods for their protection. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi by Hosseiny Fatemi, Mohammad Reza

    Published 2012
    “…This thesis is concerned with algorithm optimization and efficient low cost architecture design for integer motion estimation (IME) and sub-pixel motion estimation (SME) of H.264/AVC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Protection of the texts using Base64 and MD5 by Taha, Imad, Alahmad, Mohammad, Ahmad, Hanadi

    Published 2012
    “…So using the two protection methods together will increase the security level for protecting the data.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Early detection of breast cancer using wave elliptic equation with high performance computing by Alias, Norma, Rosly, Nur Syazana, Satam, Noriza, A. Ghaffar, Zarith Safiza, Islam, Md. Rajibul

    Published 2008
    “…This paper focuses on the implementation of parallel algorithm for the simulation of breast cancer tumor using two dimensional Helmholtz’s wave equation on a distributed parallel computer system (DPCS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…In helping the protection engineers deal with this overwhelming data, this study relied merely on digital protective relay’s recorded event report because, among other intelligent electronic devices, digital protective relay sufficiently provided virtually most attributes needed for data mining process in knowledge discovery in database. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop by Akop, Muhammad Asyraf

    Published 2017
    “…The current methods of authentication are not secure enough to protect data from malicious users. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Extreme air pollutant data analysis using classical and Bayesian approaches by Mohd Amin, Nor Azrita

    Published 2015
    “…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12
  13. 13

    Development of optimization Alghorithm for uncertain non-linear dynamical system by Abdul Aziz, Mohd. Ismail, Yaacob, Nazeeruddin, Mohd. Said, Norfarizan, Hamzah, Nor Hazadura

    Published 2004
    “…An algorithm that definitely can satisfy the objectives is the Dynamic Integrated Systems Optimization and Parameter Estimation (DISOPE) algorithm. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Therefore, there is a need to protect the fingerprint template, especially in unsecured networks to maintain data privacy and confidentiality. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Iterative methods for solving split common fixed point problems in Hilbert spaces by Mohammed, Lawan Bulama

    Published 2016
    “…In other words, we construct parallel and cyclic algorithms for solving the split common fixed point problems for strictly pseudocontractive mappings and prove the convergence results of these algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A Study Of Salting Method for Image Protection by Ahmad Faeez bin Lukman

    Published 2013
    “…This paper describes the study on benefit and importance of the implementation of Salting Method for protection of images stored in an online server database. …”
    Other
  18. 18
  19. 19

    Color Image Watermarking For Copyright Protection by Chua, Tiong Kin

    Published 2005
    “…Watermarking is an effective and potential method for copyright protection in digital audio, image and video data. …”
    Get full text
    Get full text
    Monograph
  20. 20

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper