Search Results - (( initial detection system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- initial detection »
- system algorithm »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…FPSO incorporates fuzzy edge detection technique as the initial population and the optimum membership value as the fitness function in the particle swarm optimization algorithm. …”
Get full text
Get full text
Thesis -
5
Development of vehicle detection and counting system for traffic analysis using computer vision
Published 2024“…In traffic analysis, a real-time vehicle detection and counting system is definitely important, as existing systems only provide the ability to detect or count, but not all of them. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
Get full text
Get full text
Thesis -
7
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
8
A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas
Published 2022“…Later, Long Short-Term Memory (LSTM) artificial neural network (ANN) is proposed as training algorithm in training module and prediction algorithm in detection module to be used for the development of the actual system based on this proposed framework initiative. …”
Get full text
Get full text
Get full text
Article -
9
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
Get full text
Get full text
Conference or Workshop Item -
11
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
12
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. …”
Get full text
Get full text
Article -
14
A simplified sphere decoding algorithm for MIMO transmission system
Published 2005“…In Chan-Lee sphere decoding -based algorithm, the problem of choosing initial radius has been solved by making the radius sufficiently large, thus increasing the size of the search region. …”
Get full text
Get full text
Conference or Workshop Item -
15
Video surveillance: Item monitoring against theft
Published 2023“…Next, the system will invoke the person detection module using YOLO every 1 second to detect the presence of human. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…Recently, License Plate Detection (LPD) has been used in many applications especially in transportation systems. …”
Get full text
Get full text
Thesis -
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…For the past few years, drowsiness signs detection systems have been developed as one of the initiative to reduce car crashes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
Get full text
Get full text
Thesis
