Search Results - object ((((extraction algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
- extraction algorithm »
-
1
A shift column different offset for better Rijndael security
Published 2009“…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
Get full text
Get full text
Get full text
Article -
2
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
An Algorithm for Vehicle Detection and Tracking
Published 2010“…In this paper, we propose a vehicle detection and tracking algorithm. The detection is done using the median filtering and blob extraction. …”
Get full text
Get full text
Conference or Workshop Item -
5
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
Get full text
Get full text
Thesis -
6
Automated threshold detection for object segmentation in colour image
Published 2016“…In the next stage, Line Fill (LF) algorithm is applied for smoothing the edges of object and finally background is subtracted to extract the targeted object. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
A review of object detection in traffic scenes based on deep learning
Published 2024“…It introduces techniques for optimizing object detection algorithms, summarizes commonly used object detection datasets and traffic scene datasets, along with evaluation criteria, and performs comparative analysis of the performance of deep learning algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
11
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…Feature extraction and matching algorithms are used in many computer vision problems, including object recognition and structure from motion. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
Get full text
Get full text
Thesis -
13
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…The utilization of cascade architecture to the extracted features, benefits the algorithm. The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Square groove detection based on forstner with canny edge operator using laser vision sensor
Published 2023“…Specific me1hods must be used to process images. The objectives of 1his research are to develop a detection algorithm 1hat can extract 1he feature points of1he square-groove; and 1he second objective is to evaluate 1he detection algorithm and its ability to extract 1he image features of 1he square-groove in temis of 1he accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs
Published 2006“…The label removal algorithm was developed to detect and remove labels that are printed on weld radiographs automatically before weld extraction algorithm and defect detection algorithm are applied. …”
Get full text
Get full text
Thesis -
16
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
17
A cascading fuzzy logic with image processing algorithm-based defect detection for automatic visual inspection of industrial cylindrical object’s surface
Published 2018“…The image processing algorithm has been developed to extract the main features of the tested objects such as defects, borders, and noise. …”
Get full text
Get full text
Get full text
Article -
18
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
Video Object Segmentation
Published 2009“…This report describes about a system that applies image processing to be implemented in any application of vision machine. The objective of the project is to develop an algorithm of video object segmentation to extract object of interest from background and segment the object into color homogeneity. …”
Get full text
Final Year Project -
20
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
Get full text
Get full text
Get full text
Article
