Search Results - (( developing failure connection algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- connection algorithm »
- developing failure »
- java segmentation »
- using algorithm »
-
1
-
2
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This random deployment causes issues such as coverage hole, overlapping and connectivity failure that contributes to the performance of coverage and connectivity of WSN. …”
Get full text
Get full text
Get full text
Thesis -
6
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
7
Wireless water quality cloud monitoring system with self-healing algorithm
Published 2017“…The result shows that the self-healing algorithm is able to recover itself without physical reseting, in case during distruption of wireless service connection failure.…”
Get full text
Get full text
Conference or Workshop Item -
8
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
9
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…Power systems are susceptible to unavoidable failures or outages. One of these incidents is critical line outage, which can lead to the occurrence of severe cascading failures. …”
text::Thesis -
10
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
11
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
12
-
13
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
14
Reproducing kernel Hilbert space method for cox proportional hazard model
Published 2016“…Finally, we propose an algorithm of minimization of the loss function in the general Cox model. …”
Get full text
Get full text
Get full text
Thesis -
15
Vertical Handover Decision Processes for Fourth Generation Heterogeneous Wireless Networks
Published 2013“…Thus to achieve seamless mobility and the requisite Quality of Service (QoS) in such a diverse environment, efficient ‘Vertical Handover Decision (VHD)’ algorithms needs to be designed in order to avert any degradation of services, reduction in throughput, increase in blocking probability and packet loss caused due to the unnecessary handovers, handover failures and connection breakdowns. …”
Get full text
Get full text
Get full text
Article -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Development of elasto-plastic viscous damper finite element model for reinforced concrete frames
Published 2014“…The finite element model consists of reinforced concrete frame element and viscous damper element is developed and special finite element algorithm using Newmark׳s direct step-by-step integration is developed for inelastic dynamic analysis of structure with supplementary elasto-plastic viscous damper element. …”
Get full text
Get full text
Article -
18
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Second, the increasing demand for controllers exposes the network to control planes and connection failures, which are the most frequent problems in SDN networks. …”
Get full text
Get full text
Thesis -
19
Real time vein visualization using near-infrared imaging
Published 2020“…This system is developed based on near-infrared imaging and is connected to the monitor screen. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis
