Sciweavers

1737 search results - page 4 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ACIVS
2009
Springer
13 years 2 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
ASIASIM
2004
Springer
13 years 10 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
ICPR
2002
IEEE
14 years 5 months ago
Feature Selection Using Multi-Objective Genetic Algorithms for Handwritten Digit Recognition
This paper discusses the use of genetic algorithm for feature selection for handwriting recognition. Its novelty lies in the use of a multi-objective genetic algorithms where sens...
Luiz E. Soares de Oliveira, Robert Sabourin, Fl&aa...
MASCOTS
2007
13 years 6 months ago
Multiobjective Analysis in Wireless Mesh Networks
Abstract— Wireless Mesh Networks are a scalable and costeffective solution for next-generation wireless networking. In the present work, we consider the Round Weighting Problem (...
Cristiana Gomes, Gurvan Huiban
COR
2006
99views more  COR 2006»
13 years 4 months ago
Artificial neural networks and multicriterion analysis for sustainable irrigation planning
The objective of the present paper is to select the best compromise irrigation planning strategy for the case study of Jayakwadi irrigation project, Maharashtra, India. Four-phase...
K. Srinivasa Raju, D. Nagesh Kumar, Lucien Duckste...