Search Results - (( java implementation matching algorithm ) OR ( programming security normalization algorithm ))
Search alternatives:
- implementation matching »
- normalization algorithm »
- security normalization »
- programming security »
- java implementation »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
-
3
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The effectiveness of the proposed approach is demonstrated on modified IEEE 9-, 14-, and 30-bus test system models due to the limitations in the simulator program. The results indicate that the hybrid LMT accurately assesses the dynamic security status of the system under normal and fake tripping contingencies with short time frame. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
5
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
6
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…During location estimation, current histogram of RSS at unknown location will be compared to the database. The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
7
Optimal SVC allocation via symbiotic organisms search for voltage security improvement
Published 2023“…It is desirable that a power system operation is in a normal operating condition. However, the increase of load demand in a power system has forced the system to operate near to its stability limit whereby an increase in load poses a threat to the power system security. …”
Article -
8
-
9
-
10
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…The proposed method efficiently provides security between innovative manufacturing transactions. …”
Get full text
Get full text
Article -
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
12
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
