Search Results - (( frames information security algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- frames information »
- implication based »
- java implication »
-
1
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
2
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, and combination between video compression and encryption to increase information security. …”
Get full text
Get full text
Get full text
Article -
3
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…The proposed frame selections provided additional security where the hidden data were difficult to be detected. …”
Get full text
Get full text
Thesis -
4
Algorithm Design of Digital Watermarking Scheme for Multi-frames Medical Images
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…In summary, the results obtained in this study offer accurate and high-speed information for the dynamic security state, which makes DSA classifier able to provide vital information for protection and control applications to keep the power system in a secure and reliable state.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
An enhanced adaptive grey verhulst prediction model for network security situation
Published 2016“…The proposed model applied Kalman Filtering algorithm to predict the residual in the next time-frame and closer the deviation between the predicted and actual network security situation. …”
Get full text
Get full text
Get full text
Article -
7
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for information dissemination over the networks. …”
Get full text
Get full text
Get full text
Article -
8
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…Due to the importance of maintaining the security of information that is publicly displayed, many approaches have been implemented to provide security for information dissemination over the networks. …”
Get full text
Get full text
Get full text
Article -
9
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Due to its deterministic nature and its sensitivity to initial conditions, chaos has a certain potential in creating a newway of securing information to be transmitted or stored. …”
Get full text
Get full text
Final Year Project -
10
Face recognition based automated student attendance system
Published 2018“…The face ROI is detected and segmented from the video frame by using Viola-Jones algorithm. In the pre-processing stage, scaling of the size of images is performed if necessary in order to prevent loss of information. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Visualization on colour based flow vector of thermal image for movement detection during interactive session
Published 2018“…Conventional system might cause false information with the present of shadow. Thus, methods employed in this work are Canny edge detector method, Lucas Kanade and Horn Shunck algorithms, to overcome the major problem when using thresholding method, which is only intensity or pixel magnitude is considered instead of relationships between the pixels. …”
Get full text
Get full text
Get full text
Article -
12
-
13
A new algorithm for human face detection using skin color tone
Published 2013“…The images used in this system are color images which give additional information about the images than the gray images provide. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
Collective interaction filtering with graph-based descriptors for crowd behaviour analysis
Published 2018“…The group detection experiment is implemented using the clustering algorithm. Normalized Mutual Information and Rand Index are used to measure the performance of Collective Interaction Filtering. …”
Get full text
Get full text
Thesis -
17
Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System
Published 2013“…The algorithm developed able to identify the subject come across the critical surveillance area. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Abnormal event detection in video surveillance / Lim Mei Kuan
Published 2014“…The key idea is to conceptually decompose information obtained from a given scene into several intermediate degrees of abstractions. …”
Get full text
Get full text
Thesis -
19
Multiview face emotion recognition using geometrical and texture features
Published 2017“…A 3D face pose estimation algorithm detects head rotations of Yaw, Roll and Pitch for emotion recognition. …”
Get full text
Get full text
Get full text
Thesis
