Search Results - adaptive a differential ((detection algorithm) OR (encryption algorithm))
Search alternatives:
-
1
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…It is a solution to a set of differential equations known as the Lorenz Equations, which Edward N. …”
Get full text
Get full text
Thesis -
2
Improved Switching-Basedmedian Filter For Impulse Noise Removal
Published 2013“…This thesis proposed a new algorithm to reduce impulse noise from digital images. …”
Get full text
Get full text
Thesis -
3
The noise reduction algorithm for star detection
Published 2025“…Accurate star detection plays a critical role in star sensors for spacecraft attitude determination. …”
Get full text
Get full text
Get full text
Article -
4
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…This paper introduces a novel, efficient, and accurate approach for real-time intrusion detection and classification based on the Residual Feedforward Neural Network (RFNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Development of novel distance relay scheme to prevent false tripping during power swing
Published 2017“…Moreover, a new adaptive distance protection algorithm is also developed to block the false tripping operation during power swing and unblock the operation if a fault occurs during power swing. …”
Get full text
Get full text
Thesis -
7
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…There are two strategies that have been implemented in the numerical solutions which are the variable step size and the variable step size and variable order. In the developed algorithm, a Newton divided difference interpolation has been used in approximating a non-vanishing delay, whilst a new approach that is based on an adaptation of predictor-corrector scheme has been used to handle the vanishing delay problems. …”
Get full text
Get full text
Thesis -
8
Computerized segmentation of sinus images
Published 2009Get full text
Get full text
Conference or Workshop Item -
9
Segmentation of Sinus Images for Grading of Severity of Sinusitis
Published 2009“…This project attempts to develop a computerize system by developing algorithm for the segmentation of sinus images for the detection of sinusitis. …”
Get full text
Get full text
Book Section -
10
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…Subsequently, a region growing algorithm was used to locate the pectoral muscle and suppress it from the breast. …”
Get full text
Get full text
Thesis -
11
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
Get full text
Get full text
Get full text
Article -
12
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…Although many methods are available to measure heart rate remotely from face videos, most of them only work well on stationary subjects under well-controlled conditions, and their performance significantly degrades under subject's motions and illumination variation. We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
13
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
Published 2007“…From the analysis of the metrics, it is concluded that with the employment of the proposed scheme, if a node deviates from the protocol and it is allocated with inadequate resources, the scheme will adaptively allow the node to gain the resource as per the degree of its resource under-allocation. …”
Get full text
Get full text
Thesis -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 3, we propose a new online system to detect malicious spam emails and to adapt to the changes of malicious URLs in the body of spam emails by updating the system daily. …”
Get full text
Get full text
Thesis
