Search Results - (( java detection computer algorithm ) OR ( program implementation modified algorithm ))
Search alternatives:
- implementation modified »
- program implementation »
- java detection »
-
1
-
2
Challenges of hidden data in the unused area two within executable files
Published 2009“…Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
Get full text
Get full text
Conference or Workshop Item -
5
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
7
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
8
-
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
10
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…The result also will be compare with all of algorithm experimental. This study will focused on mammographic images only by using mammography CAD (computer-aided diagnosis). …”
Get full text
Get full text
Thesis -
11
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…In this research, a hand-written character recognition model are implemented in C++ programming with ability to classify digits 0, 1, 2, and 3. …”
Get full text
Get full text
Thesis -
13
Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems
Published 2012“…Single Program Multiple Data (SPMD) parallel paradigm will be used in the parallel implementation. …”
Get full text
Get full text
Proceeding Paper -
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
15
Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment
Published 2017“…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
Get full text
Get full text
Thesis -
16
-
17
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…It has been found that by implementing the ACP algorithm, the solution predicted is approximately close or similar to the exact solution. …”
Get full text
Get full text
Thesis -
18
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017“…In this paper, we introduce a mobile based computer vision algorithm for automatic bacteria colony counting using morphological operations and transforms in image processing, on a custom Android mobile cross-platform open source software and written in Java, C++ and Open CV computer vision library. …”
Get full text
Get full text
Get full text
Article -
19
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The Electric Transient and Analysis Program (ETAP) was used as the simulation tool, while Matrices Laboratory (MATLAB) was utilized to implement all the algorithms in this study. …”
Get full text
Get full text
Thesis -
20
1D Multigrid Solver For Finite Element Method
Published 2022“…A sample of such code written in MATLAB programming language was found in the GitHub repository, where the implemented algorithms are far from optimal. …”
Get full text
Get full text
Monograph
