Search Results - adoption a differential ((detection algorithm) OR (encryption algorithm))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Novel voice activity detection based on cepstrum moments by Farzan, Ali, Nourmohammadi, Ali, Mashohor, Syamsiah, Sadra, Sarvin

    Published 2010
    “…In this paper we propose a novel statistical VAD algorithm using Cepstrum coefficients and their moments as features for classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Md. Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2019
    “…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…Image Based Oil Palm Tree Crowns Detection system is a basic system that enables the detection of oil palm tree crowns from red, green and blue (RGB) aerial images. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…Model interpreted according to an effective use theoryandbusiness analytic to form theoretical framework in advancing accuracy and reliabilityof manufacturing process using PLS-SEM solutions after collecting data throughdevelop a Google survey form to reduce iterations of complicated data, predict andenhance complexity of performance, and differentiate the day-to-dayhumanbehaviour. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period by Zulkarnain, Norsyahidah, Mohammad, Nurul Farahain, Ahmed Shogar, Ibrahim Adam

    Published 2023
    “…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…My Ph.d is focusing on constructing a detection system of malicious spam email and DDoS attack using a large number of dataset which are obtained by a server that collect double-bounce email and darknet for malicious spam email detection system and DDoS backscatter detection system, respectively. …”
    Get full text
    Get full text
    Thesis