Search Results - candidate ((((encryption algorithm) OR (optimisation algorithm))) OR (detection algorithm))
Search alternatives:
- optimisation algorithm »
-
1
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The algorithms were examined on two real datasets, namely, NSL-KDD and Landsat. …”
Get full text
Get full text
Thesis -
2
3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain
Published 2016“…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
4
-
5
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
Get full text
Get full text
Final Year Project -
6
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
7
Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah
Published 2010“…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
Get full text
Get full text
Research Reports -
8
Hybrid genetic algorithm for uncapacitated university examination timetabling problem
Published 2015“…The main components of the genetic operators in a Genetic Algorithm (GA) will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). …”
Get full text
Get full text
Thesis -
9
-
10
An e-voting application using cryptography technology
Published 2020“…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
Get full text
Get full text
Research Reports -
12
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
Get full text
Conference or Workshop Item -
14
Hybrid genetic algorithm for university examination timetabling problem
Published 2016“…The main components of the genetic operators in a GA will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). The PGA will then hybridised with three new local optimisation techniques, which will make up the HGA; to improve the solutions found. …”
Get full text
Get full text
Get full text
Article -
15
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
AES S-box modification uses affine matrices exploration for increased S-box strength
Published 2025“…The internet and technological advancements are rapidly growing in this era, potentially giving rise to new challenges, particularly in data security. One algorithm developed to secure data is the Advanced Encryption Standard (AES). …”
Get full text
Get full text
Get full text
Article -
17
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
18
A competitive co-evolutionary approach for the nurse scheduling problem
Published 2026“…The Nurse Scheduling Problem (NSP) is a constrained combinatorial optimisation problem that plays a critical role in healthcare scheduling and constraint optimisation. …”
Get full text
Get full text
Get full text
Article -
19
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…Using data obtained from one of the leading telecommunication companies in Malaysia, we show that the proposed algorithm has successfully not only detected fraud calls as suspected by the company, but also to identify suspicious calls which can be candidates of fraud call. …”
Get full text
Get full text
Conference or Workshop Item -
20
Integrated face and facial components detection
Published 2015“…The system detects face, nose and mouth using three different classifiers, which were created based on the Viola-Jones method [1] and the eyes were detected using an Eye Detection method that consists of resolution reduction, identification of the eye candidates using eye filter [2] and eyes localization based on mean comparison. …”
Get full text
Get full text
Conference or Workshop Item
