Search Results - adaptive operational (differences OR difference) ((encryption algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…In this paper, we introduce a new adaptive DNA coinpitting algorithm by using Poiymcruse Chain Rearlion (PCR). …”
    Get full text
    Get full text
    Book Section
  3. 3
  4. 4
  5. 5
  6. 6

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…In addition, this study aims to improve the performance of the face recognition method under the effect of different optical zooms by detecting the normalised facial feature region using the proposed facial feature region normalisation method. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Towards real-time visual biometric authentication using human face for healthcare telepresence mobile robots by Muralindran Mariappan, Manimehala Nadarajan, Rosalyn R Porle, Norfarariyanti Parimon

    Published 2016
    “…The biometric system proposed with hybrid algorithm at each module adapts for face images detected at different distances, poses and lighting condition. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The current Adaptive Protection Scheme (APS) motivation focused on the accurate relay operation setting changes based on the prevailing grid system configuration variations. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor by Samat, Ahmad Asri Abd

    Published 2019
    “…This new speed sensorless control is based on model reference adaptive system (MRAS) with a new adaptation scheme. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Real-time time series error-based data reduction for internet-of-things applications by Wong, Siaw Ling

    Published 2018
    “…This work differs from existing PIP in the sense that, we have devised a real-time data reduction algorithm namely error-based PIP Data Reduction (PIPE), that operates with a single value configuration; error rate, which can be used with various sensor data without any priori analysis required. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We also introduce a dynamic analysis method, AndroPsychology, in order to analyse the network communications of Android applications. We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Energy-Aware Clustering Routing for Mobile Ad-Hoc Sensor Networks (MASNETS) by Amanda, Hendrick

    Published 2020
    “…This Enhance Intra-Cluster HEED (EICHEED) proposed an adaptive routing that are suitable for MASNETs. Different experiments have been done using different parameters and numbers of results have been achieved to analyze the performance of algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…These parameters are used to develop a standalone intelligently machine learning adaptive distance relay (ML-ADR) modification. The intelligent algorithm ML-ADR fault classifier model could discriminate 10 different far-end short circuit fault types from two network topology changes with and without midpoint integrated STATCOM on the Matlab/Simulink power grid system model. …”
    Get full text
    Get full text
    Thesis
  15. 15

    IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH by AHMED ALI ALSHAKHSI, SAMEHA

    Published 2013
    “…On the other hand, WLAN operates based on IEEE 802.11 standards that support Link Adaptive (LA) technique. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The missing projection data due to metal region is detected and extracted using an improved technique of dual-step adaptive thresholding. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…K-Means algorithm a popular efficient clustering techniques and genetic algorithm a widely used evolutionary algorithm and known for its adaptive nature were combined to determine the level of handwriting legibility for each child. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Detection of hemorrhage and exudates in retinal fundus image of diabetic patients by Siti Sarah, Ahmad Mansor

    Published 2016
    “…In this phase, Edge Detection, Gradient Magnitude and Region Of Interest techniques are combined to form a complete working algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Water quality monitoring using machine learning and IoT: a review by Hasan, Tahsin Fuad, Kabbashi, Nassereldeen Ahmed, Saleh, Tanveer, Alam, Md. Zahangir, Abd Wahab, Mohd Firdaus, Nour, Abdurahman Hamid

    Published 2024
    “…Long-term cost savings can be seen in different ways as reduced labor costs, lower operational costs, early detection and intervention prevent costly repairs and emergencies, minimized infrastructure costs, distributed IoT sensors reduce the need for extensive physical infrastructure, optimized resource allocation and efficiency improvements with IoT and Machine Learning in water quality monitoring can be highlighted in the following points, real-time monitoring: immediate data analysis allows for prompt adjustments and decision-making, enhanced accuracy, advanced sensors and algorithms improve data precision and reliability, scalability, systems can be easily expanded or adapted to meet evolving needs, predictive maintenance, automated systems proactively address issues before they escalate, reducing manual oversight. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article