Search Results - adoption two different ((detection algorithm) OR (encryption algorithm))

Refine Results
  1. 1
  2. 2
  3. 3

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  4. 4

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool by Obada , M. A. Asqool

    Published 2022
    “…In order to find the best filtration algorithm, two stages were adopted in this study. The first stage was the validation of the performance of the previous algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Performance evaluation of intrusion detection system using selected features and machine learning classifiers by Raja Mahmood, Raja Azlina, Abdi, AmirHossien, Hussin, Masnida

    Published 2021
    “…Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A Bayesian probability model for Android malware detection by Sharfah Ratibah, Tuan Mat, Mohd Faizal, Ab Razak, Mohd Nizam, Mohmad Kahar, Juliza, Mohamad Arif

    Published 2021
    “…The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Md. Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2019
    “…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Asynchronous Non-Blocking Algorithm to Handle Straggler Reduce Tasks in Hadoop System by Khoiruddin, A.A., Zakaria, N., Alhussian, H.

    Published 2020
    “…Hadoop releases are equipped with algorithms to handle straggler tasks problem. However, the algorithms manage Map and Reduce task similarly, while the straggler root cause might be different for both tasks. …”
    Get full text
    Get full text
    Article
  20. 20

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…The proposed High-density Impulse Noise Detection and Removal (HINDR) model mainly consists of two parts: the impulse noise removal and impulse noisy pixel detection for restoration. …”
    Get full text
    Get full text
    Get full text
    Thesis