Search Results - (( frames information security algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing selective encryption for H.264/AVC using advanced encryption standard by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran, Zaidan, Aos Alaa, Zaidan, Bilal Bahaa

    Published 2010
    “…Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, and combination between video compression and encryption to increase information security. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Frame selection based on modified entropy and object motion for secured data hiding in videos by Muhammad Fuad, Abdullah

    Published 2021
    “…The proposed frame selections provided additional security where the hidden data were difficult to be detected. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Enhanced dynamic security assessment for power system under normal and fake tripping contingencies. by A. Salih, Qusay

    Published 2019
    “…In summary, the results obtained in this study offer accurate and high-speed information for the dynamic security state, which makes DSA classifier able to provide vital information for protection and control applications to keep the power system in a secure and reliable state.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An enhanced adaptive grey verhulst prediction model for network security situation by Leau, Yu Beng, Selvakumar Manickam

    Published 2016
    “…The proposed model applied Kalman Filtering algorithm to predict the residual in the next time-frame and closer the deviation between the predicted and actual network security situation. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for information dissemination over the networks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for information dissemination over the networks. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Due to its deterministic nature and its sensitivity to initial conditions, chaos has a certain potential in creating a newway of securing information to be transmitted or stored. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Face recognition based automated student attendance system by Chin, Howard

    Published 2018
    “…The face ROI is detected and segmented from the video frame by using Viola-Jones algorithm. In the pre-processing stage, scaling of the size of images is performed if necessary in order to prevent loss of information. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Visualization on colour based flow vector of thermal image for movement detection during interactive session by Ibrahim, Nabilah, Raman, Mohamad Nurazmi, Mahadi, Lina Farhana, Wan Zakaria, Wan Nurshazwani

    Published 2018
    “…Conventional system might cause false information with the present of shadow. Thus, methods employed in this work are Canny edge detector method, Lucas Kanade and Horn Shunck algorithms, to overcome the major problem when using thresholding method, which is only intensity or pixel magnitude is considered instead of relationships between the pixels. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A new algorithm for human face detection using skin color tone by Zangana, Hewa Majeed, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…The images used in this system are color images which give additional information about the images than the gray images provide. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Collective interaction filtering with graph-based descriptors for crowd behaviour analysis by Wong, Pei Voon

    Published 2018
    “…The group detection experiment is implemented using the clustering algorithm. Normalized Mutual Information and Rand Index are used to measure the performance of Collective Interaction Filtering. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System by Noor Amira Syuhada, Mahamad Salleh, Kamarul Hawari, Ghazali

    Published 2013
    “…The algorithm developed able to identify the subject come across the critical surveillance area. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…The key idea is to conceptually decompose information obtained from a given scene into several intermediate degrees of abstractions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multiview face emotion recognition using geometrical and texture features by Goodarzi, Farhad

    Published 2017
    “…A 3D face pose estimation algorithm detects head rotations of Yaw, Roll and Pitch for emotion recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis