Search Results - (( developing e detection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- developing e »
- e detection »
-
1
Development of Real-Time Eye Tracking Algorithm
Published 2021Get full text
Get full text
Conference or Workshop Item -
2
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Article -
3
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Conference or Workshop Item -
4
Detecting JFIF header using FORHEADER
Published 2011“…Foremost, Scalpel; however the algorithm used for header detection is not much discussed. …”
Get full text
Get full text
Get full text
Article -
5
Real time algorithm for the portable recording of fetal and maternal heart rates
Published 2023Conference paper -
6
-
7
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. Ultimately, a working prototype will be developed to validate the framework using ant colony optimization and fuzzy logic. � 2013 Springer-Verlag.…”
Conference Paper -
8
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
Get full text
Get full text
Article -
9
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
10
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010Get full text
Get full text
Get full text
Citation Index Journal -
11
Development of an efficient algorithm for fetal heart rate detection: a hardware approach
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
12
Development Of Control Algorithm For Spot Cooling System
Published 2017Get full text
Get full text
Monograph -
13
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
14
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
15
License plate detection using deep learning object detection models
Published 2024“…Since 2012, deep learning has become an emerging technology that can solve object detection with relatively better performance. However, not many works has been done when it comes to developing a real life application e.g., license plate detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
17
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
18
-
19
-
20
