Search Results - (( developing content detection algorithm ) OR ( java application design algorithm ))
Search alternatives:
- developing content »
- application design »
- content detection »
- java application »
- design algorithm »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…Ultimately, this research concludes that the developed fake news detection model based on the designed content-social-based features can effectively detect fake news in real-world news…”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
7
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
8
Shot boundary detection based on orthogonal polynomial
Published 2019“…Shot boundary detection (SBD) is a substantial step in video content analysis, indexing, retrieval, and summarization. …”
Get full text
Get full text
Get full text
Article -
9
Automated content sizing using accelerometer
Published 2014“…In this research, algorithm is developed to track the value changed in Z-axis when user moved the mobile device. …”
Get full text
Get full text
Undergraduates Project Papers -
10
-
11
-
12
Bot detection using machine learning algorithms on social media platforms
Published 2021“…The components of the study are data, feature selection, and bot detection. The research performs web development and hosting on the collected data with a machine-learning algorithm to perform bot detection in social media networks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
An analysis of hateful contents detection techniques on social media
Published 2016“…Data ambiguity problem, classification of sarcastic sentences and lack of necessary resources are identified as the difficulties for researchers in detecting the use of hateful contents. Conclusion: Future researchers must pay more attention on developing techniques to perform a deep analysis of sentences in order to detect the hateful contents. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
15
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
16
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
17
-
18
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
19
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
20
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…In this project, it introduce to a mechanism to detect an e-mail. The main idea is to identify an e-mail that user feel suspicious about the content and originality. …”
Get full text
Get full text
Research Reports
