Search Results - (( data location detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Car plate detection system by Gunasegaran, Krishnan

    Published 2005
    “…Feature extraction is performed to produce the features of the binary image. Finally, the location of the car plate is located using rule based algorithms. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…Secondly, the data collected from the main valve chamber controllers, which are located in the main pipes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
    Get full text
    Get full text
    Article
  11. 11

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…The coordinate is incorporated with a random key for data encryption. Users only can detect the location by decrypting the El-Gamal encryption.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks by Mahzan, Shahruddin, J. Staszewski, Wieslaw, Worden, Keith

    Published 2010
    “…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking by Aminuddin, Afrig, Ernawan, Ferda

    Published 2022
    “…The authentication data is embedded into the original block location, while the recovery data is embedded into the distant location from the original location based on the block mapping algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…However, the challenge in data-driven detection is its effectiveness is often detection accuracy and the speed of detection. …”
    text::Thesis
  15. 15

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Abnormalities detection in apert syndrome using hierarchical clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2025
    “…The abnormalities in Apert syndrome datasets are successfully detected by the algorithms and this study found that there are skull angles with specific location of angles are associated with Apert syndrome. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by R.Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Network monitoring system consists of large data streams, distributed architecture, and multiple computers that are geographically located all over the world caused a difficulty to detect abnormalities in the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Network monitoring system consists of large data streams, distributed architecture, and multiple computers that are geographically located all over the world caused a difficulty to detect abnormalities in the system. …”
    Get full text
    Get full text
    Conference or Workshop Item