Search Results - (( developing integrator detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- developing integrator »
- integrator detection »
- java application »
- using algorithm »
-
1
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
6
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
12
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
Get full text
Get full text
Thesis -
13
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection system detects the violation of confidentiality, integrity, and availability of the data. …”
Get full text
Get full text
Conference or Workshop Item -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Yusop......
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Article -
18
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Get full text
Article -
19
ATM crime detection using image processing integrated video surveillance : a systematic review
Published 2019“…The findings of this review may help the future researchers to develop dynamic and multipurpose algorithms for surveillance system that can detect and prevent ATM crime.…”
Get full text
Get full text
Get full text
Article -
20
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article
