Search Results - adoption _ differentiated ((detection algorithm) OR (encryption algorithm))

Search alternatives:

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Novel voice activity detection based on cepstrum moments by Farzan, Ali, Nourmohammadi, Ali, Mashohor, Syamsiah, Sadra, Sarvin

    Published 2010
    “…Statistical methods for voice activity detection (VAD) have shown impressive performance especially with respect to their ability to be tuned parametrically and adoptability with deferent environments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…Canny edge segmentation algorithm is used after that to determine the edge of the crowns by differentiate the end of object and background. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…The research aims to investigate the relationshipbetween effective use of adopting business analytics in the manufacturing industry. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period by Zulkarnain, Norsyahidah, Mohammad, Nurul Farahain, Ahmed Shogar, Ibrahim Adam

    Published 2023
    “…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 377$ 3(53867$.$$1781.8781$0,1$+ average over the testing period. …”
    Get full text
    Get full text
    Thesis