Search Results - (( developing crime using algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1
  2. 2

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…The study highlights the importance of applying these algorithms to the legal regulation of Internet financial crime. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics by Mosa, Mohammad Rasmi Hassun

    Published 2013
    “…The increasing number of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. …”
    Get full text
    Get full text
    Thesis
  7. 7

    ATM crime detection using image processing integrated video surveillance : a systematic review by Sikandar, Tasriva, Kamarul Hawari, Ghazali, Rabbi, M. F.

    Published 2019
    “…The findings of this review may help the future researchers to develop dynamic and multipurpose algorithms for surveillance system that can detect and prevent ATM crime.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Suspicious activity trigger system using YOLOv6 convolutional neural network by Suryanti, Awang, Mohd Qhairel, Rafiqi Rokei, Sulaiman, Junaida

    Published 2023
    “…Based on the experiment, 92.53% for precision and 96.6% of the accuracy is obtained using this algorithm. Therefore, YOLOv6 can be implemented in the security system to prevent crimes in residency areas.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…The AUC score provided by the proposed algorithm on PETS2009 datasets is about 0.9026 and 0.9940 for Malaysia Crime dataset. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis