Sciweavers

IJON
2016
48views more  IJON 2016»
10 years 1 months ago
Fat-Fast VG-RAM WNN: A high performance approach
The Virtual Generalizing Random Access Memory Weightless Neural Network (VGRAM WNN) is a type of WNN that only requires storage capacity proportional to the training set. As such,...
Avelino Forechi, Alberto F. De Souza, Jorcy de Oli...
IJON
2016
68views more  IJON 2016»
10 years 1 months ago
Extreme learning machine for missing data using multiple imputations
In the paper, we examine the general regression problem under the missing data scenario. In order to provide reliable estimates for the regression function (approximation), a nove...
Dusan Sovilj, Emil Eirola, Yoan Miche, Kaj-Mikael ...
IJOE
2016
67views more  IJOE 2016»
10 years 1 months ago
The Application and Practice of the Voltage Reactive Power Optimization Automatic Control System (AVC)in the Power Grid of Wuhu
: In the paper, the influence of harmonic was taken into consideration during the realization of the AVC system in the power grid of Wuhu region, relevant study and development wer...
Liang Sun, Xusheng Jian, Wenqiang Yuan
IJOE
2016
62views more  IJOE 2016»
10 years 1 months ago
Dynamic Simulation of Crank-group Driving Mechanism with Clearance
: For the crank-group driving mechanism, the assembly clearances can offer the possibility to move overcoming the processing errors. But the clearances inevitably affect the dynami...
Yansong Liu, Jujiang Cao
IJNSEC
2016
83views more  IJNSEC 2016»
10 years 1 months ago
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
A low-rate distributed denial of service (DDoS) attack has the ability to obscure its tra c because it is very similar to legitimate tra c. It can easily evade current detection m...
Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattach...
IJNSEC
2016
40views more  IJNSEC 2016»
10 years 1 months ago
Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in div...
A. Prakash, R. Dhanalakshmi
IJNSEC
2016
35views more  IJNSEC 2016»
10 years 1 months ago
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in pr...
Martin Stanek
IJNSEC
2016
39views more  IJNSEC 2016»
10 years 1 months ago
Threshold Signature Scheme without Using Polynomial Interpolation
In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer th...
Lein Harn, Feng Wang
IJNSEC
2016
39views more  IJNSEC 2016»
10 years 1 months ago
Penetration Testing and Mitigation of Vulnerabilities Windows Server
Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools - both simple and comprehensive - are themsel...
Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdul...
IJNSEC
2016
50views more  IJNSEC 2016»
10 years 1 months ago
A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid
In this paper, we proposed a novel blind digital image copyright protection scheme based on Steerable pyramid transform (SPT) and visual cryptography (VC). Unlike traditional wate...
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadi...