Search Results - (( developing detection system algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- developing detection »
- applications using »
- java applications »
- system algorithm »
- using algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A robotic hardware system has been developed using LEGO Mindstorm kit. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
8
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022“…The purpose of this paper is to develop a recognition system for seven segment displays on the Raspberry Pi. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…While numerous approaches for early detection continue to evolve, the quest for innovative methods remains constant. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
Object detection system using haar-classifier
Published 2009“…An algorithm for the design object detection systems is presented. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Previous study by Leong show the useful of CAD system but her study is not fully automated. Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
15
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…The RFNN algorithm is developed to avoid overfitting, improve detection accuracy, and accelerate training and inference. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
17
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Therefore, the aim of the study is to identify a fast, simple, and reliable method of FD on GCPV system in Malaysia. The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
18
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Monograph -
19
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
20
Detection of head position using chain code algorithm
Published 2007“…This thesis focuses on a method to recognize and detect a human at the surveillance or highlighted area boundary based their head beside; a simulation system of head detection was developed using image processing. …”
Get full text
Get full text
Thesis
