Sciweavers

50 search results - page 3 / 10
» iajit 2010
Sort
View
IAJIT
2010
190views more  IAJIT 2010»
13 years 4 months ago
Framework for intrusion detection in IEEE 802.11 wireless mesh networks
: Intrusion detection system is one of the possible solutions to timely detect the intrusions and alarm for appropriate action. So far many intrusion detection systems have been pr...
Shafiullah Khan, Kok-Keong Loo, Zia Ud Din
IAJIT
2010
196views more  IAJIT 2010»
13 years 4 months ago
A modified high capacity image steganography technique based on wavelet transform
: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under informati...
Ali Al-Ataby, Fawzi Al-Naima
IAJIT
2010
81views more  IAJIT 2010»
13 years 4 months ago
Credit Scoring Models Using Soft Computing Methods: A Survey
: During the last fifteen years, soft computing methods have been successfully applied in building powerful and flexible credit scoring models and have been suggested to be a possi...
Adel Lahsasna, Raja Noor Ainon, Teh Ying Wah
IAJIT
2010
101views more  IAJIT 2010»
13 years 4 months ago
Left Ventricle Tracking in Isotopic Ventriculography Using Statistical Deformable Models
: The left ventricle tracking in planar scintigraphic images is an important step to study the coronary state. However, it is not as simple as we thought, because of the bad qualit...
Nawrès Khalifa, Said Ettaeib, Yosra Wahabi,...
IAJIT
2010
97views more  IAJIT 2010»
13 years 4 months ago
Prolonging Network Lifetime and Data Accumulation in Heterogeneous Sensor Networks
: Research on Wireless Sensor Networks has often assumed homogeneous nodes. In reality, homogeneous nodes have different capabilities like different levels of initial energy and dr...
Dilip Kumar, Ram Patel, Trilok C. Aseri