Search Results - adoption a difference ((extraction algorithm) OR (encryption algorithm))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid by Yazid, Mariam Azwa

    Published 2015
    “…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…The algorithm is utilized for predicting a huge set of unlabeled data, given a small number of labelled data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A word stemming algorithm for Hausa language by Muazzam, Bashir, Azilawati, Rozaimee, Wan Malini, Wan Isa

    Published 2015
    “…The proposed method is a modification of Porter’s algorithm to fit Hausa morphological rules. …”
    Get full text
    Get full text
    Article
  17. 17

    Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm by W. Daud, W. M. Bukhari, Sudirman, Rubita, Omar, Camallil

    Published 2011
    “…Results: A wavelet Scalogram was plotted to display the different percentages of energy for each wavelet coefficient towards different movement. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification by Kamarudin, Noraziahtulhidayu, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Abushariah, Mohammad A. M., Hashim, Shaiful Jahari, Hassan Azhari, Abd Rauf

    Published 2015
    “…Therefore, the AP adaptive algorithm is able to reduce the echo of Quranic accents (Qiraat) signals in a consistent manner against all pattern classification techniques.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm by Muhamad Zahim, Sujod, Siti Nor Azlina, Mohd Ghazali, Mohd Fadzil, Abdul Kadir, Al-Shetwi, Ali Qasem

    Published 2024
    “…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper