Search
Now showing items 1-10 of 89
Techniques and countermeasures of TCP/IP OS fingerprinting on Linux Systems
(2007)
Port scanning is the first activity an attacker pursues when attempting to compromise a target system on a network. The aim is to gather information that will result in identifying one or more vulnerabilities in that system. ...
Artificial neural networks for image recognition : a study of feature extraction methods and an implementation for handwritten character recognition.
(1996)
The use of computers for digital image recognition has become quite widespread.
Applications include face recognition, handwriting interpretation and fmgerprint analysis.
A feature vector whose dimension is much lower ...
RAT online : design, delivery and evaluation of constructivist computer supported martial arts learning environments.
(2011)
This thesis describes the evaluation of several computer supported martial arts learning environments. These learning environments were designed, developed and implemented for practitioners of Rough and Tumble (RAT), a ...
Qualitative and structural analysis of video sequences.
(2013-10-17)
This thesis analyses videos in two distinct ways so as to improve both human understanding
and the computer description of events that unfold in video sequences.
Qualitative analysis can be used to understand a scene in ...
The development of a swarm intelligent simulation tool for sugarcane transport logistics systems.
(2013-11-14)
Transport logistics systems typically evolve as networks over time, which may result
in system rigidity and cause changes to become expensive and time consuming. In
this study a logistics model, named TranSwarm, was ...
Application of genetic algorithms to the travelling salesperson problem.
(1996)
Genetic Algorithms (GAs) can be easily applied to many different problems since
they make few assumptions about the application domain and perform relatively well.
They can also be modified with some success for handling ...
A real time, system independent, secure, Internet based auctioning system.
(2000)
This thesis outlines the creation of a secure, real time, system independent,
Internet based auctioning application. The system has been developed to meet the
needs of today's stringent reqUirements on secure Internet ...
The investigation into an algorithm based on wavelet basis functions for the spatial and frequency decomposition of arbitrary signals.
(1994)
The research was directed toward the viability of an O(n) algorithm which could decompose
an arbitrary signal (sound, vibration etc.) into its time-frequency space. The well known
Fourier Transform uses sine and cosine ...
An interpretive study of software risk management perspectives.
(2002)
This dissertation addresses risk management in the software development context. The discussion commences with the risks in software development and the necessity for a software risk management process. The emergent discourse ...
Neural network assisted software engineered refractive fringe diagnostic of spherical shocks.
(1996)
A shock is essentially a propagating variation in the pressure or density of a medium. If the medium is transparent, such as air, and the shock radially symmetric, the refractive fringe diagnostic can be
used to examine ...