Search Results - adaptive _ (differences OR difference) ((detection algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1
  2. 2

    Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection by Edris, Khalid Edris, Fakhreldin, Mohammed Adam Ibrahim, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2014
    “…In this paper, we propose Edge Adaptive Steganalysis algorithm based on histograms of the absolute difference of adjacent pixels to detect EALMR. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, M. Mahadi

    Published 2018
    “…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, Muhammad Mahadi

    Published 2018
    “…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The performance of these receivers is evaluated as a function of the number of antenna elements, Rake fingers and number of users. We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    The noise reduction algorithm for star detection by Razaman, Anis Hannani, Ahmad, Yasser Asrul, Gunawan, Teddy Surya, Khalifa, Othman Omran, Saidin, Norazlina

    Published 2025
    “…To validate the algorithm, synthetic star images with different noise levels were tested. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…In this paper, we introduce a new adaptive DNA coinpitting algorithm by using Poiymcruse Chain Rearlion (PCR). …”
    Get full text
    Get full text
    Book Section
  10. 10

    Adaptive unified neural network for dynamic power quality compensation by Ghazanfarpour, Behzad, Mohd Radzi, Mohd Amran, Mariun, Norman, Shoorangiz, Reza

    Published 2013
    “…In this work, adaptive neural network is proposed for detection and compensating of sag conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…This study looks at developing a behavior-based algorithm that adaptable to several different environment configurations. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique by Mharib, Ahmed M.

    Published 2007
    “…The results show that when processing images of different people taken in different imaging conditions, the use of only one single threshold value is not adapted, and since the proposed method is capable of adaptively adjusting its threshold values and effectively separating skin colour regions from non skin ones, it is applicable to images with various conditions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…All these algorithms are simulated using MATLAB and applied them to three different clutter models that represent different environment cases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    ROAD algorithm for control charts / Gejza Dohnal by Dohnal, Gejza

    Published 2015
    “…Robust control charts, however, usually increase the delay in the detection of assignable causes. This negative effect can, to some extent, be removed with the aid of an adaptive approach. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi by Seyed Hossein, Mahdavi

    Published 2016
    “…For the experimental validation, three test setups were conducted for identification and damage detection, including two different MDOF systems and a 2-dimentional truss structure. …”
    Get full text
    Get full text
    Thesis
  19. 19

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…At the end of this research, we will provide a device heterogeneity detection algorithm that provides accurate information in resolving the heterogeneous device detection issues.…”
    Get full text
    Get full text
    Research Reports
  20. 20