Search Results - candidate ((((detection algorithm) OR (encryption algorithm))) OR (optimisation algorithm))

Refine Results
  1. 1

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The algorithms were examined on two real datasets, namely, NSL-KDD and Landsat. …”
    Get full text
    Get full text
    Thesis
  2. 2

    3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain by Paidi, Zulfikri, Muhd Zain, Nurzaid

    Published 2016
    “…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah by Mat Jusoh, Rizal, Hamzah, Norhazimi

    Published 2010
    “…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
    Get full text
    Get full text
    Research Reports
  8. 8

    Hybrid genetic algorithm for uncapacitated university examination timetabling problem by Ishak, Suhada

    Published 2015
    “…The main components of the genetic operators in a Genetic Algorithm (GA) will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin by Ahmad, Khairul Azman, Mohd Noor, Mohd Halim, Mohamad Idin, Mohamad Adha

    Published 2011
    “…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
    Get full text
    Conference or Workshop Item
  14. 14

    Hybrid genetic algorithm for university examination timetabling problem by Ishak, Suhada, Lee, Lai Soon, Ibragimov, Gafurjan

    Published 2016
    “…The main components of the genetic operators in a GA will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). The PGA will then hybridised with three new local optimisation techniques, which will make up the HGA; to improve the solutions found. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    AES S-box modification uses affine matrices exploration for increased S-box strength by Alamsyah, Alamsyah, Setiawan, Abas, Trisnawan Putra, Anggyi, Budiman, Kholiq, Muslim, Much Aziz, Salahudin, Shahrul Nizam, Prasetiyo, Budi

    Published 2025
    “…The internet and technological advancements are rapidly growing in this era, potentially giving rise to new challenges, particularly in data security. One algorithm developed to secure data is the Advanced Encryption Standard (AES). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A competitive co-evolutionary approach for the nurse scheduling problem by Mohamad Nazri, Maizatul Farhana, Mohd Yusoh, Zeratul Izzah, Basiron, Halizah, Daud, Azlina

    Published 2026
    “…The Nurse Scheduling Problem (NSP) is a constrained combinatorial optimisation problem that plays a critical role in healthcare scheduling and constraint optimisation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…Using data obtained from one of the leading telecommunication companies in Malaysia, we show that the proposed algorithm has successfully not only detected fraud calls as suspected by the company, but also to identify suspicious calls which can be candidates of fraud call. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Integrated face and facial components detection by Ho, Lip Chin, Hanafi, Marsyita, Salka, Tanko Danial

    Published 2015
    “…The system detects face, nose and mouth using three different classifiers, which were created based on the Viola-Jones method [1] and the eyes were detected using an Eye Detection method that consists of resolution reduction, identification of the eye candidates using eye filter [2] and eyes localization based on mean comparison. …”
    Get full text
    Get full text
    Conference or Workshop Item