Search Results - (( java application optimization algorithm ) OR ( forgery detection method algorithm ))
Search alternatives:
- application optimization »
- java application »
- method algorithm »
-
1
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…A copy-move forgery detector should be able to detect forgery in a reasonable amount of time. …”
Get full text
Get full text
Thesis -
2
-
3
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…In the third approach, we proposed a detection method to reveal the forgery under illumination variations. …”
Get full text
Get full text
Thesis -
4
-
5
Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients
Published 2019“…This technique changes the content of the target image and causes variations in image features which are used to detect the forgery regions. In this study, an image splicing forgery detection method based on low-dimensional singular value decomposition of discrete cosine transform (DCT) coefficients has been presented. …”
Get full text
Get full text
Article -
6
Image splicing forgery approachs: A review and future direction
Published 2022“…This paper examines various approaches to image splicing forgery, discusses the weakness of methods, analyse the existing methods, and discusses the current solution to solve those issues, and future direction. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…An improved approach of image forgery detection, specifically image splicing detection with Constrained Convolutional Neural Network (CNN) is proposed in this research. …”
Get full text
Get full text
Thesis -
8
-
9
Web application vulnerabilities detection model
Published 2016“…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
Get full text
Get full text
Research Reports -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
12
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
13
-
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
15
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
Get full text
Get full text
Get full text
Thesis -
16
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The threshold adaptation was achieved by using the mean value, the standard deviation, and the L1-norm instead of the comparison of user summaries evaluation method to obtain a fully automatic video summarisation algorithm, and by eliminating the conditions in selecting the final key frames to reduce the complexity of the algorithm. …”
Get full text
Get full text
Article -
17
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
18
-
19
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
20
