Search Results - adoption using different ((extraction algorithm) OR (encryption algorithm))*
Search alternatives:
- extraction algorithm »
- adoption using »
-
1
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
2
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
3
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
4
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Most research in the literature used fixed key expansion algorithm for encryption and decryption. …”
Get full text
Get full text
Thesis -
5
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…This research evaluates the performance of three different symmetric cryptography algorithms. A series of testing cycles has been carrier out to identify the fastest algorithm. …”
Get full text
Get full text
Thesis -
6
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
12
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…The process of embedding and retracting the data cause the original embedded data to be distorted as a side effect of the current method used. Due to the frequently use of rounding approach, embedded data or watermark hidden in an image is retrieved differently from the original watermark (Shih et al, 2004). …”
Get full text
Get full text
Thesis -
13
Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm
Published 2011“…Statistically, the results in this study indicate that there are 93% (averages) significance differences in the extracted features of wavelet Scalogram analysis. …”
Get full text
Get full text
Get full text
Article -
14
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
15
Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification
Published 2015“…Once clean Quranic signals are produced, they undergo feature extraction and pattern classification phases. The Mel Frequency Cepstral Coefficients is the most widely used technique for feature extraction and is adopted in this research work, whereas probabilities principal component analysis (PPCA), K-nearest neighbor (KNN) and gaussian mixture model (GMM) are used for pattern classification. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin
Published 2011“…The microcontroller will be used to parse the NMEA data sentences and calculate the algorithm. …”
Get full text
Get full text
Thesis
