Search Results - adoption from different ((detection algorithm) OR (encryption algorithm))

Search alternatives:

Refine Results
  1. 1

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…In a semiconductor industry, wafer defect detection has becoming ubiquitous. Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A Bayesian probability model for Android malware detection by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif

    Published 2021
    “…The 10,000 samples for the judgement were obtained from AndroZoo and Drebin databases. The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Md. Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2019
    “…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A Bayesian probability model for Android malware detection by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif, Ahmad Firdaus, Zainal Abidin

    Published 2022
    “…The 10,000 samples for the judgement were obtained from AndroZoo and Drebin databases. The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Asynchronous Non-Blocking Algorithm to Handle Straggler Reduce Tasks in Hadoop System by Khoiruddin, A.A., Zakaria, N., Alhussian, H.

    Published 2020
    “…However, the algorithms manage Map and Reduce task similarly, while the straggler root cause might be different for both tasks. …”
    Get full text
    Get full text
    Article
  17. 17

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Stiffness reduction index for detection of damage location: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…In order to assess the validity of the new index, comparisons with an existing algorithm, that is, the co-ordinate model assurance criteria (COMAC) were undertaken using modal data from a finite element model. …”
    Get full text
    Get full text
    Article
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We also introduce a dynamic analysis method, AndroPsychology, in order to analyse the network communications of Android applications. We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…Unlike traditional methods that usually start with detection and followed by denoising, the model initially leverages the powerful ability of deep CNN architecture to separate noise from noisy image, then adopts PSO to pinpoint the most optimized threshold values for detecting impulse noisy pixels. …”
    Get full text
    Get full text
    Get full text
    Thesis