Search Results - (( developing detection computer algorithm ) OR ( java application based algorithm ))
Search alternatives:
- developing detection »
- application based »
- java application »
-
1
-
2
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
3
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
4
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…We successfully constructed the application by leveraging the robust Electron framework and employing HTML, CSS, and JavaScript languages. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Computer aided detection Computer aided detection (CAD) is a tool developed to assist radiologist interpretations from diagnostic modalities to decrease observational oversights or false negative rates. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
-
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
17
-
18
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…It also caused many protections are developed to fight the malware. The most common method of detecting malware relies on signature-based detection. …”
Get full text
Get full text
Thesis
