Search Results - adoption _ difference ((extraction algorithm) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
3
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
4
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
5
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
6
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity
Published 2018“…The objective of this research is to comparatively evaluate the effectiveness of different algorithms, method combination procedure, and their parameters towards classification accuracy. …”
Get full text
Get full text
Proceeding -
12
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
13
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…As a result, these errors will produce less accurate results during the process of extraction to the original watermark. Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm
Published 2011“…Statistically, the results in this study indicate that there are 93% (averages) significance differences in the extracted features of wavelet Scalogram analysis. …”
Get full text
Get full text
Get full text
Article -
17
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
18
A word stemming algorithm for Hausa language
Published 2015“…The proposed method is a modification of Porter’s algorithm to fit Hausa morphological rules. The system has an accuracy of 73.8% for implementation with 2573 words extracted from four different articles from Hausa Leadership newspaper. …”
Get full text
Get full text
Article -
19
Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification
Published 2015“…Once clean Quranic signals are produced, they undergo feature extraction and pattern classification phases. The Mel Frequency Cepstral Coefficients is the most widely used technique for feature extraction and is adopted in this research work, whereas probabilities principal component analysis (PPCA), K-nearest neighbor (KNN) and gaussian mixture model (GMM) are used for pattern classification. …”
Get full text
Get full text
Get full text
Article -
20
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…In the training and testing of the models, the RF-CV algorithm with set combination of FE was employed to diagnose and classify different types of faults. …”
Get full text
Get full text
Get full text
Article
