Search Results - (( data integration detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- integration detection »
- data integration »
- java application »
- using algorithm »
-
1
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
6
-
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Automatic detection of lineaments from LANDSAT images in United Arab Emirate (UAE)
Published 2006“…Integration between Canny and edge detection algorithms illustrated highly accurate level within RMSE of ± 2 m.…”
Get full text
Get full text
Conference or Workshop Item -
10
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Evaluating integrated weight linear method to class imbalanced learning in video data
Published 2011“…This paper proposed an Integrated Weight Linear (IWL) method that integrate weight linear algorithm (WL) with principle component analysis (PCA) to eliminate imbalanced dataset in soccer video data. …”
Get full text
Get full text
Conference or Workshop Item -
13
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
Get full text
Get full text
Get full text
Thesis -
14
An integrated deep learning deepfakes detection method (IDL-DDM)
Published 2024“…Consequently, such manipulation via intelligent algorithm contributes to more crucial circumstances as electronic media integrity become a challenging concern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
SVM for network anomaly detection using ACO feature subset
Published 2016“…To cope with this problem different systems have been developed and the systems are known as Intrusion detection systems. Intrusion detection system detects the violation of confidentiality, integrity, and availability of the data. …”
Get full text
Get full text
Conference or Workshop Item -
16
Enhancing Efficientnet-Yolov4 For Integrated Circuit Detection On Printed Circuit Boards
Published 2024“…Automated visual inspection of printed circuit boards (pcbs) is vital for ensuring the quality and functionality of pcbs throughout the manufacturing process. Accurately detecting integrated circuits (ics) on pcbs presents a significant challenge in automated inspection due to the wide range of component sizes and types, as well as various printing and markings on the pcb, which complicate object detection. …”
Get full text
Get full text
Thesis -
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
Published 2020“…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An estimation algorithm for improved maritime obstacle detection
Published 2024“…This paper presents an advanced estimation algorithm for improving obstacle detection in maritime navigation by integrating data from Velodyne LiDAR HDL-32E and a ZED2I depth camera on the Riptide Unmanned Surface Vehicle. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
