Search Results - adoption a differential ((detection algorithm) OR (encryption algorithm))
Search alternatives:
- a differential »
- adoption a »
-
1
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
2
Novel voice activity detection based on cepstrum moments
Published 2010“…In this paper we propose a novel statistical VAD algorithm using Cepstrum coefficients and their moments as features for classification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
4
Image Based Oil Palm Tree Crowns Detection
Published 2020“…Image Based Oil Palm Tree Crowns Detection system is a basic system that enables the detection of oil palm tree crowns from red, green and blue (RGB) aerial images. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…Model interpreted according to an effective use theoryandbusiness analytic to form theoretical framework in advancing accuracy and reliabilityof manufacturing process using PLS-SEM solutions after collecting data throughdevelop a Google survey form to reduce iterations of complicated data, predict andenhance complexity of performance, and differentiate the day-to-dayhumanbehaviour. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period
Published 2023“…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…My Ph.d is focusing on constructing a detection system of malicious spam email and DDoS attack using a large number of dataset which are obtained by a server that collect double-bounce email and darknet for malicious spam email detection system and DDoS backscatter detection system, respectively. …”
Get full text
Get full text
Thesis
