Search Results - adaptive (operational OR generating) differences ((encryption algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The performance of these receivers is evaluated as a function of the number of antenna elements, Rake fingers and number of users. We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…In this paper, we introduce a new adaptive DNA coinpitting algorithm by using Poiymcruse Chain Rearlion (PCR). …”
    Get full text
    Get full text
    Book Section
  7. 7

    Adaptive unified neural network for dynamic power quality compensation by Ghazanfarpour, Behzad, Mohd Radzi, Mohd Amran, Mariun, Norman, Shoorangiz, Reza

    Published 2013
    “…In this work, adaptive neural network is proposed for detection and compensating of sag conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The current Adaptive Protection Scheme (APS) motivation focused on the accurate relay operation setting changes based on the prevailing grid system configuration variations. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…K-Means algorithm a popular efficient clustering techniques and genetic algorithm a widely used evolutionary algorithm and known for its adaptive nature were combined to determine the level of handwriting legibility for each child. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Adaptive template matching of photoplethysmogram pulses to detect motion artefact by Lim, Pooi Khoon, Ng, Siew Cheok, Lovell, Nigel Hamilton, Yu, Yong Poh, Tan, Maw Pin, McCombie, Devin, Lim, Einly, Redmond, Stephen James

    Published 2018
    “…This study aims to develop an online artefact detection system based on adaptive (dynamic) template matching, suitable for continuous PPG monitoring during daily living activities or in the intensive care units (ICUs). …”
    Get full text
    Get full text
    Article
  13. 13

    IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH by AHMED ALI ALSHAKHSI, SAMEHA

    Published 2013
    “…On the other hand, WLAN operates based on IEEE 802.11 standards that support Link Adaptive (LA) technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…In addition, this study aims to improve the performance of the face recognition method under the effect of different optical zooms by detecting the normalised facial feature region using the proposed facial feature region normalisation method. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Towards real-time visual biometric authentication using human face for healthcare telepresence mobile robots by Muralindran Mariappan, Manimehala Nadarajan, Rosalyn R Porle, Norfarariyanti Parimon

    Published 2016
    “…The biometric system proposed with hybrid algorithm at each module adapts for face images detected at different distances, poses and lighting condition. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor by Samat, Ahmad Asri Abd

    Published 2019
    “…This new speed sensorless control is based on model reference adaptive system (MRAS) with a new adaptation scheme. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…An ensemble of these algorithms is an intelligent and adaptive solution, producing a clean output, while preserving significant pixel information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…These techniques have been used to analyze the video frames quality with different Macroblock size and different sequence of I and P frame and also with different search ranges of block prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
    Get full text
    Get full text
    Article
  20. 20

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We also introduce a dynamic analysis method, AndroPsychology, in order to analyse the network communications of Android applications. We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis