Search Results - (( data location detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- location detection »
- java application »
- using algorithm »
- data location »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
5
Car plate detection system
Published 2005“…Feature extraction is performed to produce the features of the binary image. Finally, the location of the car plate is located using rule based algorithms. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…Secondly, the data collected from the main valve chamber controllers, which are located in the main pipes. …”
Get full text
Get full text
Thesis -
8
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
Get full text
Get full text
Thesis -
10
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
11
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…The coordinate is incorporated with a random key for data encryption. Users only can detect the location by decrypting the El-Gamal encryption.…”
Get full text
Get full text
Thesis -
12
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
Get full text
Get full text
Get full text
Article -
13
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
Published 2022“…The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…However, the challenge in data-driven detection is its effectiveness is often detection accuracy and the speed of detection. …”
text::Thesis -
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
Get full text
Get full text
Get full text
Thesis -
16
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed algorithm has been applied to detect outliers in the high dimensional data. …”
Get full text
Get full text
Thesis -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
18
Abnormalities detection in apert syndrome using hierarchical clustering algorithms
Published 2025“…The abnormalities in Apert syndrome datasets are successfully detected by the algorithms and this study found that there are skull angles with specific location of angles are associated with Apert syndrome. …”
Get full text
Get full text
Get full text
Article -
19
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Network monitoring system consists of large data streams, distributed architecture, and multiple computers that are geographically located all over the world caused a difficulty to detect abnormalities in the system. …”
Get full text
Get full text
Conference or Workshop Item -
20
Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System
Published 2019“…Network monitoring system consists of large data streams, distributed architecture, and multiple computers that are geographically located all over the world caused a difficulty to detect abnormalities in the system. …”
Get full text
Get full text
Conference or Workshop Item
