Search Results - adoption two different ((detection algorithm) OR (encryption algorithm))
Search alternatives:
- two different »
- adoption two »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
-
3
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
4
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
7
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
8
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
Get full text
Get full text
Thesis -
11
-
12
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…In order to find the best filtration algorithm, two stages were adopted in this study. The first stage was the validation of the performance of the previous algorithms. …”
Get full text
Get full text
Get full text
Thesis -
13
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. …”
Get full text
Get full text
Article -
14
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
15
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
16
-
17
A Bayesian probability model for Android malware detection
Published 2021“…The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
Get full text
Get full text
Get full text
Article -
18
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
19
Asynchronous Non-Blocking Algorithm to Handle Straggler Reduce Tasks in Hadoop System
Published 2020“…Hadoop releases are equipped with algorithms to handle straggler tasks problem. However, the algorithms manage Map and Reduce task similarly, while the straggler root cause might be different for both tasks. …”
Get full text
Get full text
Article -
20
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…The proposed High-density Impulse Noise Detection and Removal (HINDR) model mainly consists of two parts: the impulse noise removal and impulse noisy pixel detection for restoration. …”
Get full text
Get full text
Get full text
Thesis
