Submit Search
Upload
Yda
•
0 likes
•
267 views
Jayne Goh 吴笠绮
Follow
Report
Share
Report
Share
1 of 1
Download now
Download to read offline
Recommended
The study evaluates three background subtraction techniques. The techniques ranges from very basic algorithm to state of the art published techniques categorized based on speed, memory requirements and accuracy. Such a review can effectively guide the designer to select the most suitable method for a given application in a principled way. The algorithms used in the study ranges from varying levels of accuracy and computational complexity. Few of them can also deal with real time challenges like rain, snow, hails, swaying branches, objects overlapping, varying light intensity or slow moving objects.
Implementation and performance evaluation of
Implementation and performance evaluation of
ijcsa
Bei Otto
Bei Otto
Tom Aikins
Jester S
Jester S
Tom Aikins
Funky Dojo
Funky Dojo
Tom Aikins
With the increasing concern for security in the network, many approaches are laid out that try to protect the network from unauthorised access. New methods have been adopted in order to find the potential discrepancies that may damage the network. Most commonly used approach is the vulnerability assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the attack. Assessment of these system vulnerabilities provide a means to identify and develop new strategies so as to protect the system from the risk of being damaged. This paper focuses on the usage of various vulnerability scanners and their related methodology to detect the various vulnerabilities available in the web applications or the remote host across the network and tries to identify new mechanisms that can be deployed to secure the network.
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
ijcsa
In this paper we introduce an approach to model technological process of manufacture of a field-effect heterotransistor. The modeling gives us possibility to optimize the technological process to decrease length of channel by using mechanical stress. As accompanying results of the decreasing one can find decreasing of thickness of the heterotransistors and increasing of their density, which were comprised in integrated circuits.
Modeling of manufacturing of a field effect transistor to determine condition...
Modeling of manufacturing of a field effect transistor to determine condition...
ijcsa
Zense Sidebar
Zense Sidebar
Tom Aikins
As the information proliferates, searching for relevant information has become a primary task. Searching or Information retrieval (IR) aims to help the users in organising as well as retrieving those documents from the documentary collection which are most likely to satisfy information needs of the user. An optimal Information Retrieval System (IRS) is one which retrieves only those documents from the document database which are pertinent to user's information needs, while excluding documents that are not relevant. Genetic Algorithm is described by higher likelihood of finding good solutions to large and complex problems of IR optimisation. The performance of Genetic Algorithm depends upon the decision of underlying operators used namely selection, crossover and mutation. A GA-based algorithm IRIGA (Information Retrieval Improvement using Genetic Algorithm) is developed to improve the performance of Information Retrieval System. This paper presents a comparison of performance of IRIGA when different selection methods are used. The results are analysed by conducting experiments keeping the rest of the GA parameters as constant and varying only the selection strategy.
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
ijcsa
Recommended
The study evaluates three background subtraction techniques. The techniques ranges from very basic algorithm to state of the art published techniques categorized based on speed, memory requirements and accuracy. Such a review can effectively guide the designer to select the most suitable method for a given application in a principled way. The algorithms used in the study ranges from varying levels of accuracy and computational complexity. Few of them can also deal with real time challenges like rain, snow, hails, swaying branches, objects overlapping, varying light intensity or slow moving objects.
Implementation and performance evaluation of
Implementation and performance evaluation of
ijcsa
Bei Otto
Bei Otto
Tom Aikins
Jester S
Jester S
Tom Aikins
Funky Dojo
Funky Dojo
Tom Aikins
With the increasing concern for security in the network, many approaches are laid out that try to protect the network from unauthorised access. New methods have been adopted in order to find the potential discrepancies that may damage the network. Most commonly used approach is the vulnerability assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the attack. Assessment of these system vulnerabilities provide a means to identify and develop new strategies so as to protect the system from the risk of being damaged. This paper focuses on the usage of various vulnerability scanners and their related methodology to detect the various vulnerabilities available in the web applications or the remote host across the network and tries to identify new mechanisms that can be deployed to secure the network.
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
ijcsa
In this paper we introduce an approach to model technological process of manufacture of a field-effect heterotransistor. The modeling gives us possibility to optimize the technological process to decrease length of channel by using mechanical stress. As accompanying results of the decreasing one can find decreasing of thickness of the heterotransistors and increasing of their density, which were comprised in integrated circuits.
Modeling of manufacturing of a field effect transistor to determine condition...
Modeling of manufacturing of a field effect transistor to determine condition...
ijcsa
Zense Sidebar
Zense Sidebar
Tom Aikins
As the information proliferates, searching for relevant information has become a primary task. Searching or Information retrieval (IR) aims to help the users in organising as well as retrieving those documents from the documentary collection which are most likely to satisfy information needs of the user. An optimal Information Retrieval System (IRS) is one which retrieves only those documents from the document database which are pertinent to user's information needs, while excluding documents that are not relevant. Genetic Algorithm is described by higher likelihood of finding good solutions to large and complex problems of IR optimisation. The performance of Genetic Algorithm depends upon the decision of underlying operators used namely selection, crossover and mutation. A GA-based algorithm IRIGA (Information Retrieval Improvement using Genetic Algorithm) is developed to improve the performance of Information Retrieval System. This paper presents a comparison of performance of IRIGA when different selection methods are used. The results are analysed by conducting experiments keeping the rest of the GA parameters as constant and varying only the selection strategy.
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
IMPACT OF DIFFERENT SELECTION STRATEGIES ON PERFORMANCE OF GA BASED INFORMATI...
ijcsa
Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these systems and social networks. The focus will be mainly on the vulnerabilities that are used in OSNs as the convertors which convert the social network into antisocial network and these networks can be further used for the network attacks on the users associated with the victim user whereby creating a consecutive chain of attacks on increasing number of social networking users. Another type of attack, Stuxnet Attack which was originally designed to attack Iran’s nuclear facilities is also discussed here which harms the system it controls by changing the code in that target system. The Stuxnet worm is a very treacherous and hazardous means of attack and is the first of its kind as it allows the attacker to manipulate real-time equipment.
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...
ijcsa
Sala Rim Naam
Sala Rim Naam
Tom Aikins
Nus Grad Cert
Nus Grad Cert
Jayne Goh 吴笠绮
Dubliner
Dubliner
Tom Aikins
Alila Hua Hin
Alila Hua Hin
Tom Aikins
Ginger
Ginger
Tom Aikins
Stratasoft Overview
Stratasoft Overview
Stratasoft Overview
faisalmehmood
Krabi
Krabi
Tom Aikins
Vivaldi
Vivaldi
Tom Aikins
L Opera
L Opera
Tom Aikins
Vj Leaving Cert
Vj Leaving Cert
Jayne Goh 吴笠绮
Vj Testimonial
Vj Testimonial
Jayne Goh 吴笠绮
Tradershotelcert
Tradershotelcert
Jayne Goh 吴笠绮
O Levels Cert
O Levels Cert
Jayne Goh 吴笠绮
Nygh Cca Record
Nygh Cca Record
Jayne Goh 吴笠绮
Nus Case Com Cert
Nus Case Com Cert
Jayne Goh 吴笠绮
Doc Chengs Vip
Doc Chengs Vip
Jayne Goh 吴笠绮
Jill Lowe Cert
Jill Lowe Cert
Jayne Goh 吴笠绮
Doc Chengs Rest Manager
Doc Chengs Rest Manager
Jayne Goh 吴笠绮
Doc Chengs Crew
Doc Chengs Crew
Jayne Goh 吴笠绮
A Levels Main
A Levels Main
Jayne Goh 吴笠绮
A Levels
A Levels
Jayne Goh 吴笠绮
More Related Content
Viewers also liked
Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these systems and social networks. The focus will be mainly on the vulnerabilities that are used in OSNs as the convertors which convert the social network into antisocial network and these networks can be further used for the network attacks on the users associated with the victim user whereby creating a consecutive chain of attacks on increasing number of social networking users. Another type of attack, Stuxnet Attack which was originally designed to attack Iran’s nuclear facilities is also discussed here which harms the system it controls by changing the code in that target system. The Stuxnet worm is a very treacherous and hazardous means of attack and is the first of its kind as it allows the attacker to manipulate real-time equipment.
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...
ijcsa
Sala Rim Naam
Sala Rim Naam
Tom Aikins
Nus Grad Cert
Nus Grad Cert
Jayne Goh 吴笠绮
Dubliner
Dubliner
Tom Aikins
Alila Hua Hin
Alila Hua Hin
Tom Aikins
Ginger
Ginger
Tom Aikins
Stratasoft Overview
Stratasoft Overview
Stratasoft Overview
faisalmehmood
Krabi
Krabi
Tom Aikins
Vivaldi
Vivaldi
Tom Aikins
L Opera
L Opera
Tom Aikins
Viewers also liked
(10)
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...
Sala Rim Naam
Sala Rim Naam
Nus Grad Cert
Nus Grad Cert
Dubliner
Dubliner
Alila Hua Hin
Alila Hua Hin
Ginger
Ginger
Stratasoft Overview
Stratasoft Overview
Krabi
Krabi
Vivaldi
Vivaldi
L Opera
L Opera
More from Jayne Goh 吴笠绮
Vj Leaving Cert
Vj Leaving Cert
Jayne Goh 吴笠绮
Vj Testimonial
Vj Testimonial
Jayne Goh 吴笠绮
Tradershotelcert
Tradershotelcert
Jayne Goh 吴笠绮
O Levels Cert
O Levels Cert
Jayne Goh 吴笠绮
Nygh Cca Record
Nygh Cca Record
Jayne Goh 吴笠绮
Nus Case Com Cert
Nus Case Com Cert
Jayne Goh 吴笠绮
Doc Chengs Vip
Doc Chengs Vip
Jayne Goh 吴笠绮
Jill Lowe Cert
Jill Lowe Cert
Jayne Goh 吴笠绮
Doc Chengs Rest Manager
Doc Chengs Rest Manager
Jayne Goh 吴笠绮
Doc Chengs Crew
Doc Chengs Crew
Jayne Goh 吴笠绮
A Levels Main
A Levels Main
Jayne Goh 吴笠绮
A Levels
A Levels
Jayne Goh 吴笠绮
Internship Evaluation Form
Internship Evaluation Form
Jayne Goh 吴笠绮
Proposal Sustainable Shopper Traffic
Proposal Sustainable Shopper Traffic
Jayne Goh 吴笠绮
Jayne Goh C.V 0909
Jayne Goh C.V 0909
Jayne Goh 吴笠绮
More from Jayne Goh 吴笠绮
(15)
Vj Leaving Cert
Vj Leaving Cert
Vj Testimonial
Vj Testimonial
Tradershotelcert
Tradershotelcert
O Levels Cert
O Levels Cert
Nygh Cca Record
Nygh Cca Record
Nus Case Com Cert
Nus Case Com Cert
Doc Chengs Vip
Doc Chengs Vip
Jill Lowe Cert
Jill Lowe Cert
Doc Chengs Rest Manager
Doc Chengs Rest Manager
Doc Chengs Crew
Doc Chengs Crew
A Levels Main
A Levels Main
A Levels
A Levels
Internship Evaluation Form
Internship Evaluation Form
Proposal Sustainable Shopper Traffic
Proposal Sustainable Shopper Traffic
Jayne Goh C.V 0909
Jayne Goh C.V 0909
Download now