Search Results - mode ((((encryption algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Enhanced chaotic image encryption algorithm based on Baker's map by Salleh, Mazleena, Ibrahim, Subariah, lsnin, Fauz

    Published 2003
    “…The algorithm also supports two modes of operation namely EBC and CBC. …”
    Get full text
    Get full text
    Article
  3. 3

    Reusable data-path architecture for encryption-then-authentication on FPGA by Abbas Y.A., Jidin R., Jamil N., Zaba M.R.

    Published 2023
    “…For this proposed reusable data-path, we have chosen LED algorithm for encryption and then PHOTON to generate the MAC code. …”
    Article
  4. 4

    A parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2009
    “…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of a parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2014
    “…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode by Bahbibi Rahmatullah

    Published 2023
    “…A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode by Bahbibi Rahmatullah…”
    Get full text
    article
  9. 9
  10. 10

    Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode. by Tan , Beng Ghee

    Published 2016
    “…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…A smart object tracking algorithm (SOTA) has been proposed for detecting and identifying the shoot on the conveyor belt. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Article
  17. 17

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Hydraulic characterization of PVC-O pipes by means of transient tests by Ghazali, M. F., Nizwan, Che Ku Eddy, Ismail, Nurazima, Sani, M. S.M., Yusof, Mohd Fadhlan M., Mohamed, Zamri

    Published 2019
    “…The series of decomposition of signals is then carefully selected on where the supposed reflected intrinsic mode function (IMF). These IMFs that where being displayed by using a mathematical algorithm, that is known as Hilbert Transform (HT) spectrum. …”
    Get full text
    Get full text
    Research Report
  20. 20

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
    Get full text
    Get full text
    Thesis