Search Results - (( motion estimation drop algorithm ) OR ( fake communication based algorithm ))
Search alternatives:
- communication based »
- fake communication »
- drop algorithm »
-
1
-
2
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Boyer - Moore algorithm was claimed to be the fastest algorithm among the others. …”
Get full text
Get full text
Research Reports -
4
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024Proceedings Paper -
5
A comparative study and simulation of object tracking algorithms
Published 2020“…The algorithms using convolution features and multi-features fusion algorithms have more advantages in tracking accuracy than the algorithm using a single feature, but the tracking speed will also drop rapidly. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Generation of synthetic 5G network dataset using Generative Adversarial Network (GAN)
Published 2024“…The two algorithms were compared based on statistical analysis such as the distribution and Pearson Correlation analysis. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
8
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
Published 2023“…Nowadays, multimedia content like images are easily to be distributed globally because of the widespread usage of information and communication technologies. Digital watermarking is an approach to prevent attacks or modification on images that might lead to serious problems like spreading of fake news, image piracy and illegal distribution of images. …”
Get full text
Get full text
Undergraduates Project Papers
