Search Results - (( effective implementation detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- implementation detection »
- java application »
- using algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Real-Time Face Detection And Tracking Using Software And Hardware Design
Published 2018“…For FPGA implementation the entire face detection algorithm was implemented on Cyclone IV FPGA device using Altera DE2-115. …”
Get full text
Get full text
Monograph -
6
DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES
Published 2019“…The deep-learning algorithm to be deployed is Faster R-CNN and to be implemented using MATLAB. …”
Get full text
Get full text
Final Year Project -
7
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…As for further enhancement, yawning monitorization can be integrated with the system for better analyzation and detection. As overall, this paper proposes the development of a cost and power saving and effective drowsiness detection system by implementing EAR formula and HOG algorithm, which would be easily fixed and utilized in all type of four-wheeled vehicles.…”
Get full text
Get full text
Final Year Project -
8
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…Urban road safety is critically undermined by the presence of potholes, which necessitate accurate detection and assessment for effective maintenance. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. …”
Get full text
Get full text
Article -
12
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Implementation of the proposed method shows that it is robust and applicable for various kind of fruit images and is more accurate than the existing edge detection algorithms.…”
Get full text
Get full text
Get full text
Article -
13
Detection of surface defects of aluminium extrudants using artificial intelligence
Published 2024“…Although nowadays some manufacturing industries have implemented algorithms to automate the detection of defects, those algorithms face challenges on dealing with noises and lighting changes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
On-board real time vision based sensor implementation on UAV for features detection technique of low altitude mapping / Nor Hashim Mohd Arshad … [et al.]
Published 2014“…The idea is to implement simple algorithm to process digitized analog images which are captured using simple analog video cameras. …”
Get full text
Get full text
Get full text
Book Section -
16
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
20
