Search Results - (( java application using algorithm ) OR ( control classification system algorithm ))
Search alternatives:
- control classification »
- classification system »
- java application »
- system algorithm »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…In this paper an algorithm is developed for automatic spray control system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
-
7
-
8
A new mobile malware classification for SMS exploitation
Published 2024“…This paper explores how mobile malware exploit the system calls via SMS. As a solution, we proposed a system calls classification based on surveillance exploitation system calls for SMS. …”
Conference Paper -
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
-
11
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The machine learning algorithms have been performed with labeled output for prediction classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
Investigation of the optimal sensor location and classifier for human motion classification
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…The computation efficiency of the proposed algorithm has enabled the implementation of the soft robotic glove system prototype by using simple hardware.…”
Get full text
Get full text
Thesis -
16
Single trial motor imagery classification for a four state brain machine interface
Published 2009Get full text
Article -
17
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
18
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
19
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The system is simulated using EPANET (Environmental Prediction Agency Network) software based on actual water distribution system (WDS) data from Benghazi city, Libya. …”
Get full text
Get full text
Thesis -
20
