Search Results - (( java application optimisation algorithm ) OR ( using computer detection algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed of the detection engine used in SNORT-NIDS. …”
Get full text
Get full text
Thesis -
3
-
4
Signal detection algorithm for cognitive radio using singular value decomposition
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
Get full text
Get full text
Thesis -
6
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…The goal of intrusion detection is to discover unauthorized use of computer systems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
8
Immune Multi agent System for Network Intrusion Detection using Non- linear Classification Algorithm
Published 2010Get full text
Get full text
Citation Index Journal -
9
Fire Detection Algorithm using Image Processing Techniques
Published 2015Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021Get full text
Get full text
Get full text
Article -
12
Solving time gap problems through the optimization of detecting stepping stone algorithm
Published 2004Get full text
Get full text
Book Section -
13
Facial mask detection in low light environment
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
14
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
15
Malaysian license plate number detection based on sobel vertical edge algorithm / Siti Nor Azimah Ibrahim
Published 2007“…The system captures the images of the vehicles with a digital camera. An algorithm for the detection of license plate has been designed and an algorithm for filter the detected edge is proposed for future process which is plate number extraction This project describes the method used by a computer to convert digital images of vehicles license plate into electronic text. …”
Get full text
Get full text
Thesis -
16
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The algorithms based on image feature detection and matching are critical in the field of computer vision. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Intelligent failure connection algorithm for detecting internet worms
Published 2009“…In this paper, we show that our algorithm can detect new types of worms. This paper shows that intelligent Failure Connection Algorithm (IFCA) operation is faster than traditional algorithm in detecting worms.…”
Get full text
Get full text
Get full text
Article -
18
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
19
Bot detection using machine learning algorithms on social media platforms
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
20
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
