Search Results - mode ((((extraction algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
- extraction algorithm »
-
1
A parallel XTS encryption mode of operation
Published 2009“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
2
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
3
Implementation of a parallel XTS encryption mode of operation
Published 2014“…Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
4
Real‑time chatter detection during turning operation using wavelet scattering network
Published 2024“…Several attempts have been made to detect chatter. Some manual feature extraction methods used to detect the chatter involve wavelet packet transform (WPT), ensemble empirical mode decomposition (EEMD), local mean decomposition (LMD), and variational mode decomposition (VMD). …”
Get full text
Get full text
Get full text
Article -
5
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
6
A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode
Published 2023“…A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode by Bahbibi Rahmatullah…”
Get full text
article -
7
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
8
Encryption selection for WLAN IEEE802.11G
Published 2013“…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
Get full text
Get full text
Thesis -
9
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…The algorithm also supports two modes of operation namely EBC and CBC. …”
Get full text
Get full text
Article -
11
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
12
Transient-based leak detection and monitoring of water pipes using complementary ensemble empirical mode decomposition (CEEMD) method
Published 2021“…In this paper, an adaptive decomposition algorithm that is Complementary Ensemble Empirical Mode Decomposition (CEEMD) proposed in order to overcome the problem occur in Hilbert-Huang Transform (HHT) method. …”
Get full text
Get full text
Get full text
Article -
13
Development of sorting system for oil palm in vitro shoots using machine vision approach
Published 2014“…A smart object tracking algorithm (SOTA) has been proposed for detecting and identifying the shoot on the conveyor belt. …”
Get full text
Get full text
Thesis -
14
A new algorithm to identify nonlinear vibration of car body in white (BIW) structure
Published 2013Get full text
Get full text
Research Book Profile -
15
A Comparison Of The Different Algorithms For Essential Tremor And Parkinson’s Disease Tremor Differentiation Based On Hand Tremor
Published 2018“…The distribution of features extracted from each algorithm was tested with Mann Whitney U test, and the sensitivity, specificity and accuracy for each algorithms in correctly classify ET patients were analysed using receiver operating curves (ROC). …”
Get full text
Get full text
Monograph -
16
Structural assessment of damaged and CFRP repaired reinforced concrete beams from experimental modal analysis / Moatasem Mohammed Fayyadh
Published 2012“…Thus in this study, new algorithms based on natural frequencies and mode shapes for damage detection are proposed to overcome some of the shortcomings which are related to reinforced concrete (RC) being a composite and heterogeneous material. …”
Get full text
Get full text
Thesis -
17
-
18
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
Get full text
Get full text
Get full text
Thesis -
19
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
20
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis
