Search Results - adoption from different ((extraction algorithm) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
- adoption from »
-
1
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
4
-
5
An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity
Published 2018“…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
Get full text
Get full text
Proceeding -
6
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
7
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
8
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Due to the frequently use of rounding approach, embedded data or watermark hidden in an image is retrieved differently from the original watermark (Shih et al, 2004). …”
Get full text
Get full text
Thesis -
9
A word stemming algorithm for Hausa language
Published 2015“…The proposed method is a modification of Porter’s algorithm to fit Hausa morphological rules. The system has an accuracy of 73.8% for implementation with 2573 words extracted from four different articles from Hausa Leadership newspaper. …”
Get full text
Get full text
Article -
10
-
11
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm
Published 2011“…Statistically, the results in this study indicate that there are 93% (averages) significance differences in the extracted features of wavelet Scalogram analysis. …”
Get full text
Get full text
Get full text
Article -
13
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…This study aimed to explore the performance of different pre-processing methods, namely Fast Fourier Transform, Short-Time Fourier Transform, Discrete Wavelet Transform, and Continuous Wavelet Transform (CWT) that could allow TL models to extract features from the images generated and classify through selected classical ML algorithms . …”
Get full text
Get full text
Thesis -
14
Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin
Published 2011“…This algorithm has the ability of extract the data from GPS receiver and communicate via RS232 to test the interaction from GPS receiver. …”
Get full text
Get full text
Thesis -
15
Songket pattern classification using backpropagation neural network / Nik Aidil Syawalni Nik Mazlan
Published 2024“…The process included data pre-processing and feature extraction. The BPNN algorithm was implemented to proficiently identify and classify Songket pattern, and the evaluation involved analyzing predicted results with different data splitting ratios, such as 70:30 and 80:20. …”
Get full text
Get full text
Thesis -
16
Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar
Published 2016“…Unfortunately, to extract reusable features from natural language requirements for reuse is not easy. …”
Get full text
Get full text
Thesis -
17
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
18
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
19
Personalized human emotion classification using genetic algorithm
Published 2010Get full text
Working Paper -
20
Data mining reduction methods and performances of rules
Published 2009“…In summary, results show that in terms of performance of rules, Genetic Algorithm has produced the highest number of rules followed by Johnson’s Algorithm and Holte’s 1R.The best classifier for extracting rules in this study is VOT (Voting of Object Tracking).In terms of performance of rules, best results comes from rules with 30 attributes, followed by rules with 1 intersection attribute and lastly rules with 3 intersection attributes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
