Search Results - (( parameter estimation encryption algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- java segmentation »
- using algorithm »
- parameter »
-
1
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…We then conduct a comparative analysis toward estimating the running time during the encryption and decryption process. …”
Get full text
Get full text
Thesis -
6
Analysis on the Rabin-p cryptosystem
Published 2016“…This paper presents an analysis toward estimating the algorithm running time on the Rabin-p cryptosystem. …”
Get full text
Get full text
Conference or Workshop Item -
7
Image orientation watermarking technique for copyright protection
Published 2016“…Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
