Search Results - adaptive generation differences ((encryption algorithm) OR (extraction algorithm))

Refine Results
  1. 1
  2. 2

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Unified neural network controller of series active power filter for power quality problems mitigation by Ghazanfarpour, Behzad

    Published 2013
    “…The first and core unit of the controller utilizes adaptive neural network algorithm to extract fundamental component of the supply voltage and detach the present voltage harmonic. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…K-Means algorithm a popular efficient clustering techniques and genetic algorithm a widely used evolutionary algorithm and known for its adaptive nature were combined to determine the level of handwriting legibility for each child. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive Similarity Component Analysis in Nonparametric Dynamic Environment by Sojodishijani, Omid

    Published 2011
    “…Consequently, the proposed adaptive feature extraction technique and neighborhood-based classifier family are tightly integrated in an adaptive K-nearest neighbor classifier.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…The instructor needs to provide two related source codes that are similar but in different domain. Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…Lightning strikes model as in PSCAD library have been adapted to generate impulsive transient in this research. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…On top of that, the existing analysis tools and algorithms did not consider the data generated by sensory devices connected to the Internet. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features by Khalid, Fatimah, Amjeed, Noor, O.K. Wirza, Rahmita Wirza, Madzin, Hizmawati, Azizan, Illiana

    Published 2020
    “…With the proposed method the illumination model will fit with variation of illumination conditions in a whole image to generate an adaptive threshold for a novel columnar binary conversion method. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application by Mat Seman., Norhidayah

    Published 2019
    “…The interpreter functions to extract and interpret the x and y data positions from the generated G-code. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
    Get full text
    Get full text
    Article
  20. 20