Search Results - (( developing crime using algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- developing crime »
- using algorithm »
- crime using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Algorithm for the legal regulation of internet financial crime
Published 2024“…The study highlights the importance of applying these algorithms to the legal regulation of Internet financial crime. …”
Get full text
Get full text
Get full text
Article -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
Published 2013“…The increasing number of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. …”
Get full text
Get full text
Thesis -
8
ATM crime detection using image processing integrated video surveillance : a systematic review
Published 2019“…The findings of this review may help the future researchers to develop dynamic and multipurpose algorithms for surveillance system that can detect and prevent ATM crime.…”
Get full text
Get full text
Get full text
Article -
9
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023“…Based on the experiment, 92.53% for precision and 96.6% of the accuracy is obtained using this algorithm. Therefore, YOLOv6 can be implemented in the security system to prevent crimes in residency areas.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…The AUC score provided by the proposed algorithm on PETS2009 datasets is about 0.9026 and 0.9940 for Malaysia Crime dataset. …”
Get full text
Get full text
Thesis -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Convolution Neural Network (CNN) using deep learning algorithm is chosen in identifying frequency of movement and execution time of housebreaking crime. …”
Get full text
Get full text
Thesis -
13
Evolving fuzzy grammar for crime texts categorization
Published 2015“…The fuzzy notion is used because the grammar matching, parsing and derivation involve uncertainty. …”
Get full text
Get full text
Get full text
Article -
14
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
Get full text
Get full text
Thesis -
15
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
16
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
18
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…In a human detection, the software is represented by algorithms, in which algorithm also being used in the process of training the dataset. …”
Get full text
Get full text
Final Year Project -
19
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
20
