Search Results - (( data detection based algorithm ) OR ( java application interface algorithm ))
Search alternatives:
- java application »
- detection based »
- data detection »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
7
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
8
-
9
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
10
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
13
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
16
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
Published 2016“…It provides an algorithm to the discovery of error and duplicates entries in the data sets of existing data warehouse. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…However, the current DBN.NIDS model is still ineffective for large-scale real-world data due to some issues: 1) the pre-training of the DBN algorithm includes simple feature learning which does not work very well to extract important features from the attack data, 2) the classification task of the DBN algorithm is a poor detection for imbalanced class dataset and 3) the design of the DBN model could be weak and need to be continuously updated by modern definitions of abnormal to detect recent attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item
