Search Results - (( java application testing algorithm ) OR ( based detection system algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- system algorithm »
- based detection »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…This research presents a design and development of robotic system based on LEGO Mindstorm kit. The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…In light of this, our research project aimed to develop and evaluate a highly efficient desktop application meticulously designed for a SARS-CoV-2 testing device based on electrochemical potentiostat principles. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
6
Machine learning algorithms in context of intrusion detection
Published 2016“…Design of efficient, accurate, and low complexity intrusion detection system is a challenging task. Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
Get full text
Get full text
Conference or Workshop Item -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
10
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
11
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
12
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
Embedded system based driver drowsiness detection system
Published 2023“…This paper presents a System-on-Chip (SoC) visual-based driver drowsiness detection system. …”
Conference paper -
15
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
16
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
17
-
18
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article
