Search Results - (( development content detection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- development content »
- data normalization »
- content detection »
- java »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…Ultimately, this research concludes that the developed fake news detection model based on the designed content-social-based features can effectively detect fake news in real-world news…”
Get full text
Get full text
Get full text
Thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
6
Shot boundary detection based on orthogonal polynomial
Published 2019“…Shot boundary detection (SBD) is a substantial step in video content analysis, indexing, retrieval, and summarization. …”
Get full text
Get full text
Get full text
Article -
7
Automated content sizing using accelerometer
Published 2014“…In this research, algorithm is developed to track the value changed in Z-axis when user moved the mobile device. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
9
-
10
Bot detection using machine learning algorithms on social media platforms
Published 2021“…The components of the study are data, feature selection, and bot detection. The research performs web development and hosting on the collected data with a machine-learning algorithm to perform bot detection in social media networks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
An analysis of hateful contents detection techniques on social media
Published 2016“…Data ambiguity problem, classification of sarcastic sentences and lack of necessary resources are identified as the difficulties for researchers in detecting the use of hateful contents. Conclusion: Future researchers must pay more attention on developing techniques to perform a deep analysis of sentences in order to detect the hateful contents. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…To solve this issue, we proposed a method to help the cloud provides a suitable content for devices. Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
13
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
14
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…In this project, it introduce to a mechanism to detect an e-mail. The main idea is to identify an e-mail that user feel suspicious about the content and originality. …”
Get full text
Get full text
Research Reports -
15
Methods and challenges in shot boundary detection: a review
Published 2018“…The developed algorithms are discussed, and challenges and recommendations are presented.…”
Get full text
Get full text
Get full text
Article -
16
Computer algorithm for automated detection of intramedullary rod hole position and orientation / Ahmad Zulhilmi Mohd Ziyadi
Published 2014“…It is achieve by using special algorithm that detect holes 2D coordinates and average width of intramedullary rod. …”
Get full text
Get full text
Thesis -
17
Segmentation of Sinus Images for Grading of Severity of Sinusitis
Published 2009Get full text
Get full text
Book Section -
18
Face detection and stereo matching algorithms for smart surveillance system with IP cameras
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
20
Hyperspectral imaging for detection of macronutrients retained in glutinous rice under different drying conditions
Published 2025“…Subsequently, predictive models were developed based on processed spectra for the detection of the macronutrients, which include protein content (PC), moisture content (MC), fat content (FC), and ash content (AC). …”
Get full text
Get full text
Get full text
Article
