Search Results - (( cover selection methods algorithm ) OR ( based information systems algorithm ))
Search alternatives:
- selection methods »
- methods algorithm »
- based information »
- systems algorithm »
- cover selection »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
2
Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim
Published 2007“…A study on the research and development of the previous project based on pattern recognition has been done as a result selected; method, theory and techniques will be gathered in order to perform a hand gesture for sign language recognition system. …”
Get full text
Thesis -
3
Image steganography for encryption over network security
Published 2017“…The performance of the image steganography method has been evaluated based on the quality of cover image with stego image, robustness and capacity of data hidden in the stego image. …”
Get full text
Get full text
Student Project -
4
A predictive approach to improve a fault tolerance confidence level on grid resources scheduling
Published 2008“…On the other hand, since many methods use from GIS information to learn about resources, so they cannot powerfully select optimal nodes because the GIS don't cover all information about grid resources. …”
Get full text
Get full text
Article -
5
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…In the other hand a new concealment method proposed by combine two of the popular methods DWT and DCT for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, wavelet transform which use dyadic filters to decompose cover image into 4-levels (HH, HL, LH and LL) and discrete cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components then according to the percentages entering by a user the encrypted data will distribute. …”
Get full text
Get full text
Get full text
Article -
6
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
7
Imaging of solid flow in a gravity flow rig using infra-red tomography
Published 2005“…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
Get full text
Get full text
Thesis -
8
Termite mounds morphometry in predicting groundwater potentiality using geospatial technology
Published 2020“…Thereafter, twelve (12) groundwater conditioning factors (GCFs) (geology, drainage density, lineament density, lineament intersection density, land use/land cover, topographic wetness index (TWI), normalized difference vegetation index (NDVI), slope, elevation, plan curvature, static water level and groundwater level fluctuation) were passed through a feature selection filter (Correlation-based feature selection using the best first algorithm) to select the optimum groundwater control factors (GCFs) for groundwater prediction in the study area. …”
Get full text
Get full text
Thesis -
9
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…In conclusion, the method optimised the cover audio selected, thus, improving the effectiveness of the audio steganography used. …”
Get full text
Get full text
Get full text
Article -
10
Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni
Published 2018“…The finalized configuration that resulted in the best response was adopted and used to collect data for training and classifying the gait phase using pattern recognition method. The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
Get full text
Get full text
Get full text
Thesis -
11
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
12
Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System
Published 2013“…Hence, this present paper proposed few techniques on image processing to enhance the surveillance efficiency based on the thermal image dataset. The selection of the correct technique is followed the specification, process and output from this thermal surveillance system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…Groundwater quality assessment based on the data obtained from arbitrary sampling wells might be presented redundant or shortage of information. …”
Get full text
Get full text
Thesis -
14
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
Published 2018“…Material and methods: To test the proposed technique, selected approximation algorithms have been developed to small graph instances. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A Systematic Review on Cover Selection Methods For Steganography: Trend Analysis, Novel Classification and Analysis of the Elements
Published 2026journal::journal article -
16
-
17
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Get full text
Article -
18
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
19
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
20
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…It was shown that our approach needs 30% of the test cases to cover all the faults, while 80% is needed to cover all the faults using retest-all, which is time consuming and costly.…”
Get full text
Get full text
Article
