Search Results - different ((estimation algorithm) OR (((extraction algorithm) OR (encryption algorithm))))

Refine Results
  1. 1

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Time Difference Of Arrival Estimation Using Fast Fourier Transform Overlap For Underwater Positioning by Tan, Chee Sheng

    Published 2019
    “…An extraction of a signal from a receiver is performed by using digital signal processing algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…The Rivest-Shamir-Adleman (RSA) algorithm, known for its slow single-precision multiplication (spm) and overall running time, is not commonly employed to encrypt user data directly. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Parameter extraction of photovoltaic module using hybrid evolutionary algorithm by Muhsen D.H., Ghazali A.B., Khatib T.

    Published 2023
    “…Algorithms; Diodes; Extraction; Iterative methods; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Different evolutions; Differential Evolution; Diode modeling; Electromagnetism-like algorithm; Extracting parameter; Hybrid evolutionary algorithm; Photovoltaic model; Photovoltaic modules; Evolutionary algorithms…”
    Conference Paper
  9. 9
  10. 10

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…In the task of individual tree extraction, the point cloud distance discriminant clustering algorithm outperformed the watershed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    The noise reduction algorithm for star detection by Razaman, Anis Hannani, Ahmad, Yasser Asrul, Gunawan, Teddy Surya, Khalifa, Othman Omran, Saidin, Norazlina

    Published 2025
    “…To validate the algorithm, synthetic star images with different noise levels were tested. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact by Matori, A.N, Hassaballa, A. Haleem

    Published 2011
    “…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
    Get full text
    Get full text
    Article
  14. 14

    Surface Moisture Content Retrieval from Visible/Thermal Infrared Images and Field Measurements by Abdalla HASSABALLA, Abdalhaleem, MATORI , Abdul Nasir, Mohd SHAFRI, Helmi Zulhaidi

    Published 2013
    “…Moisture content parameters were calculated, and then the moisture content algorithm was generated accordingly for the two study locations with three different “Split-window” algorithms and finally a spatial validation of satellite θ algorithms was conducted for accuracy assessment. …”
    Get full text
    Get full text
    Article
  15. 15

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…Then the results are compared to the average energy dissipation (μJ) by applying different encryption data, AES, SF and SIT algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Single-Trial Subspace-Based Approach for VEP Extraction by Nidal S., Kamel

    Published 2010
    “…With the simulated data, the algorithms are used to estimate the latencies of P100, P200, and P300 of VEP signals corrupted by additive colored noise at different values of SNR. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.] by Abdullah, Suzanah, Tahar, Khairul Nizam, Abdul Rashid, Mohd Fadzil, Osoman, Muhammad Ariffin

    Published 2021
    “…In this study, UAV technology has been taking a look at several algorithms for estimating tree height value of a single tree crown. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Signal quality measures for unsupervised blood pressure measurement by Abdul Sukora, Jumadi, Redmond, S J, Chan, G S H, Lovell, N H

    Published 2012
    “…The mean systolic and diastolic differences were 0.37 ± 3.31 and 3.10 ± 5.46 mmHg, respectively, when the artifact detection algorithm was utilized, with the algorithm correctly determined if the signal was clean enough to attempt an estimation of systolic or diastolic pressures in 93% of blood pressure measurements.…”
    Get full text
    Get full text
    Get full text
    Article