Search Results - object ((((extraction algorithm) OR (encryption algorithm))) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    A shift column different offset for better Rijndael security by Mahmod, Ramlan, Ali, Sherif Abdulbari, Abd Ghani, Abdul Azim

    Published 2009
    “…The secrecy of an encryption algorithm is measured in terms of the computational power and time required to extract the secret key. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    An Algorithm for Vehicle Detection and Tracking by Malik , Aamir Saeed

    Published 2010
    “…In this paper, we propose a vehicle detection and tracking algorithm. The detection is done using the median filtering and blob extraction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin by AmirHussin, 'Afina

    Published 2019
    “…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…In the next stage, Line Fill (LF) algorithm is applied for smoothing the edges of object and finally background is subtracted to extract the targeted object. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    A review of object detection in traffic scenes based on deep learning by Zhao, Ruixin, Tang, SaiHong, Supeni, Eris Elianddy, Abdul Rahim, Sharafiz, Fan, Luxin

    Published 2024
    “…It introduces techniques for optimizing object detection algorithms, summarizes commonly used object detection datasets and traffic scene datasets, along with evaluation criteria, and performs comparative analysis of the performance of deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  11. 11

    A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke

    Published 2021
    “…Feature extraction and matching algorithms are used in many computer vision problems, including object recognition and structure from motion. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Analysis of artificial neural network and viola-jones algorithm based moving object detection by Rashidan, M. Ariff, Mohd Mustafah, Yasir, Zainal Abidin, Zulkifli, Zainuddin, N. Afiqah, A. Aziz, Nor Nadirah

    Published 2014
    “…The utilization of cascade architecture to the extracted features, benefits the algorithm. The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Square groove detection based on forstner with canny edge operator using laser vision sensor by Mohammed Naji, Osamah Abdullah Ahmed

    Published 2023
    “…Specific me1hods must be used to process images. The objectives of 1his research are to develop a detection algorithm 1hat can extract 1he feature points of1he square-groove; and 1he second objective is to evaluate 1he detection algorithm and its ability to extract 1he image features of 1he square-groove in temis of 1he accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs by Soo , Say Leong

    Published 2006
    “…The label removal algorithm was developed to detect and remove labels that are printed on weld radiographs automatically before weld extraction algorithm and defect detection algorithm are applied. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  17. 17

    A cascading fuzzy logic with image processing algorithm-based defect detection for automatic visual inspection of industrial cylindrical object’s surface by Ali, Mohammed A. H., Au, Kai Lun

    Published 2018
    “…The image processing algorithm has been developed to extract the main features of the tested objects such as defects, borders, and noise. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    Video Object Segmentation by Putri Norhidayah bt Megat Abdul Rahaman, Putri Norhidayah

    Published 2009
    “…This report describes about a system that applies image processing to be implemented in any application of vision machine. The objective of the project is to develop an algorithm of video object segmentation to extract object of interest from background and segment the object into color homogeneity. …”
    Get full text
    Final Year Project
  20. 20

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Article