Search Results - adaptive testing difference ((encryption algorithm) OR (detection algorithm))
Search alternatives:
- testing difference »
-
1
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
2
The noise reduction algorithm for star detection
Published 2025“…To validate the algorithm, synthetic star images with different noise levels were tested. …”
Get full text
Get full text
Get full text
Article -
3
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
Get full text
Get full text
Get full text
Article -
4
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The Man-Whitney U test is then performed to statistically evaluate the significance difference of the second rank and FESSIC algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique
Published 2007“…The results show that when processing images of different people taken in different imaging conditions, the use of only one single threshold value is not adapted, and since the proposed method is capable of adaptively adjusting its threshold values and effectively separating skin colour regions from non skin ones, it is applicable to images with various conditions. …”
Get full text
Get full text
Thesis -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
7
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…Additionally, the suggested algorithm is highly adaptable and straightforward to accommodate different types of intrusion. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…Main results: Our algorithm achieved an overall accuracy of 91.5% ± 2.9%, with a sensitivity of 94.1% ± 2.7% and a specificity of 89.7% ± 5.1%, when tested on our own data. …”
Get full text
Get full text
Article -
9
New CFAR algorithm and circuit development for radar receiver
Published 2020“…All these algorithms are simulated using MATLAB and applied them to three different clutter models that represent different environment cases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An adaptive face recognition under constrained environment for smartphone database
Published 2018“…In addition, using data from smartphone devices introduces a new challenge, namely, different optical zooms. This problem affects the accuracy of face recognition systems when the test and gallery images of the same person differ in terms of face-to-camera distance. …”
Get full text
Get full text
Thesis -
11
Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi
Published 2016“…For the experimental validation, three test setups were conducted for identification and damage detection, including two different MDOF systems and a 2-dimentional truss structure. …”
Get full text
Get full text
Thesis -
12
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The evaluation results showed that the Improved AKF algorithm achieved better compression ratio and retained sufficient information in the extracted action key frames under different testing video shots. …”
Get full text
Get full text
Article -
13
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…Throughout the thesis all proposed methods and algorithms have been applied with both curvelet and wavelet for comparison and statistical tests were also performed. …”
Get full text
Get full text
Thesis -
14
Towards real-time visual biometric authentication using human face for healthcare telepresence mobile robots
Published 2016“…The biometric system proposed with hybrid algorithm at each module adapts for face images detected at different distances, poses and lighting condition. …”
Get full text
Get full text
Get full text
Article -
15
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…An ensemble of these algorithms is an intelligent and adaptive solution, producing a clean output, while preserving significant pixel information. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
A Scheme For Space-Time-Frequency Coding And Adaptive Multiple Antenna Selection For Improving The Performance Of Multiple-Input Single-Output Ofdm System
Published 2006“…Realizing that ST and SF behave differently in different environments, a new adaptive spatial mode (ASM)-OFDM is proposed. …”
Get full text
Get full text
Thesis -
18
Compact Convolutional neural network (CNN) based on SincNet for end-to-end motor imagery decoding and analysis
Published 2021“…In order to validate the performance of proposed algorithms, two datasets were used; the first is the publicly available BCI Competition IV dataset 2a, which was often used as a benchmark in validating motor imagery classification algorithms, and the second is a dataset consists of primary data initially collected to study the difference between motor imagery and mental-task associated motor imagery BCI and was used to test the plausibility of the proposed algorithm in highlighting the differences in terms of cortical rhythms. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A New Method Of Speed Sensorless Control For Permanent Magnet Synchronous Motor
Published 2019“…This new speed sensorless control is based on model reference adaptive system (MRAS) with a new adaptation scheme. …”
Get full text
Get full text
Thesis -
20
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis
