يعرض 1 - 20 نتائج من 20 نتيجة بحث عن '(( image encryption algorithm ) OR ( code detection algorithm ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes حسب Temadher Alassiry Al-Maadeed (14147847)

    منشور في 2022
    "…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
  2. 2

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
  3. 3

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.</p><h2>Other Information</h2><p dir="ltr">Published in: Computational and Applied Mathematics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s40314-023-02208-x" target="_blank">https://dx.doi.org/10.1007/s40314-023-02208-x</a></p>…"
  4. 4

    A decoding algorithm for I-Q space-time coded systems in fadingenvironments حسب Zummo, S.A.

    منشور في 2000
    "…Simulation results showed that I-Q ST codes with the new algorithm provide coding gains over ST codes having the same complexity but with a single encoder…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5
  6. 6

    CNN and HEVC Video Coding Features for Static Video Summarization حسب Issa, Obada

    منشور في 2022
    "…The proposed solutions are compared with existing works based on an SIFT flow algorithm that uses CNN features. Subsequently, an optional dimensionality reduction based on stepwise regression was applied to the feature vectors prior to detecting key frames. …"
    احصل على النص الكامل
    article
  7. 7
  8. 8

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. Furthermore, encrypting the same amount of information in images of varying sizes resulted in approximately 6.77 percent improvements. …"
  9. 9

    Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection حسب Serkan Kiranyaz (3762058)

    منشور في 2020
    "…It further enables medical experts to gain an enhanced visualization capability of echo images through color-coded segments along with their “maximum motion displacement” plots helping them to better assess wall motion and LV Ejection-Fraction (LVEF). …"
  10. 10

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System حسب Mohd Imran (12249782)

    منشور في 2025
    "…Our main contribution includes: (a) Secure template generation by Mobius transformation using user keyset (p, q), (b) Securing the user template using permutation and encryption operation. The analysis of security and matching performance of the proposed preservation scheme has been evaluated against publicly available fingerprint database FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1 and FVC2004 DB3 containing 800 images of 100 persons, 8 images per person in each database using FMR, FAR, GAR, ROC Curve, and EER parameters. …"
  11. 11
  12. 12

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 13

    BIT-SLICE MICROPROCESSOR-BASED COMMUNICATIONS DECODER حسب SOOMRO, AA

    منشور في 2020
    "…To augment the throughput of the decoder for realtime decoding, the ALU word length is chosen to be equal to that of a code word and the decoding operation is accomplished in two steps, i.e. error detection and error correction. …"
    احصل على النص الكامل
    article
  14. 14

    MSLP: mRNA subcellular localization predictor based on machine learning techniques حسب Saleh Musleh (15279190)

    منشور في 2023
    "…</p><h3>Availability</h3><p dir="ltr">We have implemented a Docker container and API for end users to run their sequences on our model. Datasets, the code of API and the Docker are shared for the community in GitHub at: https://github.com/smusleh/MSLP.…"
  15. 15

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE حسب ULLAH, SAAD

    منشور في 2022
    "…Seasonal thresholds are set for sensor values, and the algorithm detects hazardous trends when values exceed safe limits, correlating them with related sensors to generate combined variables and error codes. …"
    احصل على النص الكامل
  16. 16

    A GENERAL REAL-TIME DECODER BASED ON AMD2900 DEVICES حسب SOOMRO, AA

    منشور في 2020
    "…First, bit-slice microprocessors are used and ALU word length is chosen to be equal to that of a code word. Second, decoding operation is accomplished in two steps, namely (1) Error detection and (2) Error correction. …"
    احصل على النص الكامل
    article
  17. 17

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. …"
  18. 18

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  19. 19

    UML-based regression testing for OO software حسب Mansour, Nashat

    منشور في 2010
    "…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20

    Secure and Anonymous Communications Over Delay Tolerant Networks حسب Spiridon Bakiras (16896408)

    منشور في 2020
    "…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …"