Search Results - adoption a different ((extraction algorithm) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
- a different »
- adoption a »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
3
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
4
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
5
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
6
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…This combination provides a secure key management mechanism and data hiding to provide strong encryption and decryption standards. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
12
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…The algorithm is utilized for predicting a huge set of unlabeled data, given a small number of labelled data. …”
Get full text
Get full text
Thesis -
16
A word stemming algorithm for Hausa language
Published 2015“…The proposed method is a modification of Porter’s algorithm to fit Hausa morphological rules. …”
Get full text
Get full text
Article -
17
Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm
Published 2011“…Results: A wavelet Scalogram was plotted to display the different percentages of energy for each wavelet coefficient towards different movement. …”
Get full text
Get full text
Get full text
Article -
18
Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification
Published 2015“…Therefore, the AP adaptive algorithm is able to reduce the echo of Quranic accents (Qiraat) signals in a consistent manner against all pattern classification techniques.…”
Get full text
Get full text
Get full text
Article -
19
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article -
20
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper
