Search Results - adoption from different ((detection algorithm) OR (encryption algorithm))
Search alternatives:
- adoption from »
-
1
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
3
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
4
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
Get full text
Get full text
Thesis -
5
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…In a semiconductor industry, wafer defect detection has becoming ubiquitous. Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…The parameters of the Jang algorithm and TransGuide algorithm were sensitive for different days. …”
Get full text
Get full text
Get full text
Thesis -
9
Recursive linear network modeling for detecting gas leak
Published 2010Get full text
Get full text
Conference or Workshop Item -
10
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
11
A Bayesian probability model for Android malware detection
Published 2021“…The 10,000 samples for the judgement were obtained from AndroZoo and Drebin databases. The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
Get full text
Get full text
Get full text
Article -
12
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
13
Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni
Published 2018“…The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
Get full text
Get full text
Get full text
Thesis -
14
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
15
A Bayesian probability model for Android malware detection
Published 2022“…The 10,000 samples for the judgement were obtained from AndroZoo and Drebin databases. The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
Get full text
Get full text
Get full text
Article -
16
Asynchronous Non-Blocking Algorithm to Handle Straggler Reduce Tasks in Hadoop System
Published 2020“…However, the algorithms manage Map and Reduce task similarly, while the straggler root cause might be different for both tasks. …”
Get full text
Get full text
Article -
17
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
Get full text
Get full text
Get full text
Article -
18
Stiffness reduction index for detection of damage location: Analytical study
Published 2011“…In order to assess the validity of the new index, comparisons with an existing algorithm, that is, the co-ordinate model assurance criteria (COMAC) were undertaken using modal data from a finite element model. …”
Get full text
Get full text
Article -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We also introduce a dynamic analysis method, AndroPsychology, in order to analyse the network communications of Android applications. We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…Unlike traditional methods that usually start with detection and followed by denoising, the model initially leverages the powerful ability of deep CNN architecture to separate noise from noisy image, then adopts PSO to pinpoint the most optimized threshold values for detecting impulse noisy pixels. …”
Get full text
Get full text
Get full text
Thesis
