Search Results - (( developing filing detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing filing »
- implication based »
- filing detection »
- java implication »
-
1
Detecting JFIF header using FORHEADER
Published 2011“…Header and footer are important in digital investigation for JPEG file detection as only 16% of files are fragmented. …”
Get full text
Get full text
Get full text
Article -
2
On the Identification of FOSD-based Non-zero Onset Speech Dataset
Published 2020“…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
Get full text
Get full text
Conference or Workshop Item -
3
Object detection system using haar-classifier
Published 2009“…An algorithm for the design object detection systems is presented. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Final output of the algorithm summarise the bleeding detection for all patient in an excel file. …”
Get full text
Get full text
Thesis -
5
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
Get full text
Get full text
Thesis -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…Two approaches introduced to detect malware in Android mobile environment namely static analysis and dynamic analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
thesis::doctoral thesis -
12
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Prevention of Textual Plagiarism Application
Published 2011“…In order to achieve this, a system which named as Prevention of Textual Plagiarism Application will be developed which provides the capability to detect similarities between documents submitted by students. …”
Get full text
Get full text
Final Year Project -
14
Audio files comparator using wavelet transform and similarity metrics
Published 2025“…Its primary objective is to identify the similarities among audio files with different information such as file names or formats. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Smart and energy aware routing for the internet of mobile things
Published 2021“…The network simulation process is run in the CupCarbon software which is known as a smart city & IoT wireless sensor network simulator. The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
Get full text
Get full text
Get full text
Article -
18
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
19
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
20
A Unified Strategy for Sequence and Sequence-less T-way Test Suite Generation
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item
