Search Results - (( java segmentation using algorithm ) OR ( attack affecting efficient algorithm ))
Search alternatives:
- affecting efficient »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…In conclusion, this work has presented an improved optimization algorithm that can improve the accuracy of IDSs in the detection of various types of network attack.…”
Get full text
Get full text
Thesis -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
7
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…Additionally, the dynamic change in the network routing affects the network’s security, making it vulnerable to various attacks, and results data loss. …”
Get full text
Get full text
Article -
9
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…Additionally, the dynamic change in the network routing affects the network’s security, making it vulnerable to various attacks, and results data loss. …”
Get full text
Get full text
Article -
10
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
Published 2019“…Although many solutions have been developed to address the detection of Botnet in real time, these solutions are still prone to several problems that may critically affect the efficiency and capability of identifying and preventing Botnet attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The secure node authentication algorithm prevents attacks from accessing the network. …”
Get full text
Get full text
Article -
12
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
Published 2022“…Additionally, the dynamic change in the network routing affects the network’s security, making it vulnerable to various attacks, and results data loss. …”
Get full text
Get full text
Article -
13
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2022“…Additionally, the dynamic change in the network routing affects the network’s security, making it vulnerable to various attacks, and results data loss. …”
Get full text
Get full text
Get full text
Article -
14
-
15
AN INTEGRATED TECHNIQUE IN ACHIEVING THE CONFIDENTIALITY, INTEGRITY AND ROBUSTNESS FOR BIG DATA TRANSMISSION
Published 2017“…It can protect different security attacks by offering higher Avalanche Effects (76.2%) and Entropy Value (7.77). …”
Get full text
Get full text
Thesis
