Search Results - (( java application using algorithm ) OR ( changes detection system algorithm ))
Search alternatives:
- changes detection »
- java application »
- system algorithm »
- using algorithm »
-
1
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
4
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
-
8
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
9
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Develop algorithm for change detection of the salinity from Landsat-8 images
Published 2016“…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
12
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
Article -
13
High Accuracy Estimation Of Head Yaw Using Bounding Box Algorithm On A Vision Based System
Published 2020“…The objectives of the research are divided into three, to detect a face from the real-time stream of a camera and obtain bounding box coordinates around the detected face of the human, to analyze the change of distance and head yaw angle between the human face and camera with the effect of area and width of the bounding box on and lastly to design and validate the algorithm for estimation of the head yaw angle from the viewpoint of the camera. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Lastly, to obtain the robust surveillance system in real-time moving objects detection.…”
Get full text
Get full text
Research Reports -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
18
A hybrid method using haar-like and skin-color algorithm for hand posture detection, recognition and tracking
Published 2010“…The system combines two algorithms to achieve better detection rate for hand. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
20
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…Changes in a system model should only induce local changes in a Bayesian network, where as system changes might require the design and training of an entirely new Neural network. …”
Get full text
Get full text
Thesis
