Search Results - adoption _ differentiated ((detection algorithm) OR (encryption algorithm))
Search alternatives:
- adoption »
-
1
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
2
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…The Savitzky-Golay (SG) filter was adopted for smoothing and denoising the EEG dataset. …”
Get full text
Get full text
Conference or Workshop Item -
3
Novel voice activity detection based on cepstrum moments
Published 2010“…Statistical methods for voice activity detection (VAD) have shown impressive performance especially with respect to their ability to be tuned parametrically and adoptability with deferent environments. …”
Get full text
Get full text
Conference or Workshop Item -
4
Image Based Oil Palm Tree Crowns Detection
Published 2020“…Canny edge segmentation algorithm is used after that to determine the edge of the crowns by differentiate the end of object and background. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…The research aims to investigate the relationshipbetween effective use of adopting business analytics in the manufacturing industry. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period
Published 2023“…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 377$ 3(53867$.$$1781.8781$0,1$+ average over the testing period. …”
Get full text
Get full text
Thesis
