Search Results - (( java application based algorithm ) OR ( program detection computer algorithm ))
Search alternatives:
- application based »
- program detection »
- java application »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
3
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
4
Multicolour object detection using multithreading
Published 2015“…The number of threads created in multithreading’s algorithm is depending on the number of colours to be detected. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
-
7
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
-
10
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
11
Adaptive algorithms for automated intruder detection in surveillance networks
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
-
14
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Get full text
Get full text
Thesis -
15
-
16
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
17
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
