Search Results - (( java application based algorithm ) OR ( self detection method algorithm ))
Search alternatives:
- application based »
- java application »
- method algorithm »
- self detection »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Article -
3
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Get full text
Article -
4
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
5
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…For both indoor and outdoor scene, the proposed algorithm outperforms the other methods with accuracy 97% and 100%. …”
Get full text
Get full text
Thesis -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
A lower complexity K best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Article -
9
A lower complexity k best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
-
13
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
19
Improved self-organizing map clustering of power transformer dissolved gas analysis using inputs pre-processing
Published 2023“…Clustering algorithms; Conformal mapping; Data visualization; Power transformers; Self organizing maps; Support vector machines; Data normalization methods; Detection sensitivity; Dissolved gas analyses (DGA); Dissolved gas analysis; High dimensional data; Incipient fault detection; Interpretation methods; Topological relations; Fault detection…”
Article -
20
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Memory testing is a method that requires an algorithm capable of detecting faulty memory as comprehensively as possible to facilitate the efficient manufacture of fault free memory products. …”
Get full text
Get full text
Thesis
