Search Results - adoption two different ((extraction algorithm) OR (encryption algorithm))
Search alternatives:
- extraction algorithm »
- two different »
- adoption two »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
-
3
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Lastly, KD-3D-CA Block cipher is more complex and it outperforms AES with more than 25% for different key sizes. Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
-
8
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
9
-
10
Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm
Published 2011“…Conclusion: From the result, it is proved that the different EOG signals exhibit differences in signals energy with their corresponding scale such as leftward with scale 6 (8- 16Hz), rightward with scale 8 (2-4Hz), downward with scale 9 (1-2Hz) and upward with level 7 (4-8Hz). …”
Get full text
Get full text
Get full text
Article -
11
Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification
Published 2015“…In order to verify our methodology, audio files have been collected for Surat Ad-Duhaa for five different Quranic accents (Qiraat), namely: (1) Ad-Duri, (2) Al-Kisaie, (3) Hafs an A’asem, (4) IbnWardan, and (5) Warsh. …”
Get full text
Get full text
Get full text
Article -
12
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
13
Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin
Published 2011“…This algorithm has the ability of extract the data from GPS receiver and communicate via RS232 to test the interaction from GPS receiver. …”
Get full text
Get full text
Thesis -
14
Instant Sign Language Recognition by WAR Strategy Algorithm Based Tuned Machine Learning
Published 2025“…Afterward, the WAR Strategy optimization algorithm has been adopted in two procedures, first in optimizing the extracted set of features, and second to fine-tune the hyperparameters of six standard machine learning models in order to achieve precise and efficient sign language recognition. …”
Article -
15
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…Scalable PV array is modelled with the generated power of 10 kW for small-scale, 250 kW for medium-scale and 2 MW for large-scale. In the training and testing of the models, the RF-CV algorithm with set combination of FE was employed to diagnose and classify different types of faults. …”
Get full text
Get full text
Get full text
Article -
16
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. In addition, amongst the eighteen TL models evaluated based on the CWT transformation, fourteen was f ound to be able to extract the features reasonable, i.e., VGG16, VGG19, ResNet101, ResNet101 V2, ResNet152, ResNet152 V2, Inception V3, Inception ResNet V2, Xception, MobileNetV2, DenseNet 121, DenseNet 169, NasNetMobile and NasNetLarge. …”
Get full text
Get full text
Thesis -
17
Personalized human emotion classification using genetic algorithm
Published 2010Get full text
Working Paper -
18
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…The spike encoding was used for feature extraction. The algorithm for this learning model adopted the reward-modulated STDP. …”
Get full text
Get full text
Monograph -
19
-
20
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
Get full text
Get full text
Thesis
