Search Results - (( java application customization algorithm ) OR ( stone detection method algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- method algorithm »
- stone detection »
-
1
Using a novel algorithm in ultrasound images to detect renal stones
Published 2021“…Expectation–Maximization algorithm is a novel method used by us for the first time for identifying renal stones. …”
Get full text
Get full text
Get full text
Proceedings -
2
The optimization of stepping stone detection: packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
3
The optimization of stepping stone detection : packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
4
The optimization of stepping stone detection: Packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
Get full text
Get full text
Get full text
Article -
5
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…As violence detection technology continues to evolve, our research stands as a crucial stepping stone towards achieving improved public safety and security in the face of dynamic challenges.…”
Get full text
Get full text
Get full text
Article -
6
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
7
Mental stress classification based on selected electroencephalography channels using correlation coefficient of Hjorth parameters
Published 2023“…The implications of this research are profound, offering a stepping stone toward the development of real-time stress detection devices, and consequently, enabling clinicians to make more informed therapeutic decisions based on comprehensive brain activity monitoring…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
