Search Results - (( java implementation level algorithm ) OR ( programming features detection algorithm ))
Search alternatives:
- implementation level »
- programming features »
- java implementation »
- features detection »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
-
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…This thesis provided a detailed method in implementing the algorithm for face and person recognition by using haar cascade classifier feature detection and contour approximation. …”
Get full text
Get full text
Monograph -
6
-
7
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Hence, the research objective is to create an improved diabetic disease detection system using a Flock Optimization Algorithm-Based Deep Learning Model (FOADLM) feature modeling approach that leverages the PIMA Indian dataset to predict and classify diabetic disease cases. …”
Get full text
Get full text
Article -
8
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…The CNN method has been used in this study to detect children because the method can automatically learn pattern features and reduce the incompleteness caused by artificial design features. …”
Get full text
Get full text
Thesis -
9
Biometric recognition system for UiTM Melaka Student’s Campus entrance / Khairul Rohaizzat Jamaluddin
Published 2017Get full text
Get full text
Student Project -
10
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
12
SURF algorithm-based panoramic image mosaic application
Published 2018“…To build the image mosaic, SURF (Speeded Up Robust Feature) algorithm is used in feature detection and OpenCV is used in the programming. …”
Get full text
Get full text
Article -
13
SURF algorithm-based panoramic image mosaic application
Published 2018“…To build the image mosaic, SURF (Speeded Up Robust Feature) algorithm is used in feature detection and OpenCV is used in the programming. …”
Get full text
Get full text
Article -
14
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
15
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
16
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
18
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
19
Human Spontaneous Emotion Detection System
Published 2018“…Having smart computerized system which can understand and instantly gives appropriate response to human is the utmost motive in human and computer interaction (HCI) field.It is argued either HCI is considered advance if human could not have natural and comfortable interaction like human to human interaction.Besides,despite of several studies regarding emotion detection system, current system mostly tested in laboratory environment and using mimic emotion.Realizing the current system research lack of real life or genuine emotion input,this research work comes up with the idea of developing a system that able to recognize human emotion through facial expression.Therefore,the aims of this study are threefold which are to enhance the algorithm to detect spontaneous emotion,to develop spontaneous facial expression database and to verify the algorithm performance.This project used Matlab programming language,specifically Viola Jones method for features tracking and extraction,then pattern matching for emotion classification purpose.Mouth feature is used as main features to identify the emotion of the expression.For verification purpose,the mimic and spontaneous database which are obtained from internet,open source database or novel (own) developed databases are used.Basically,the performance of the system is indicated by emotion detection rate and average execution time.At the end of this study,it is found that this system is suitable for recognizing spontaneous facial expression (63.28%) compared to posed facial expression (51.46%).The verification even better for positive emotion with 71.02% detection rate compared to 48.09% for negative emotion detection rate.Finally,overall detection rate of 61.20% is considered good since this system can execute result within 3s and use spontaneous input data which known as highly susceptible to noise.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…The use of linguistic features to detect the sentiment in Twitter tweets are explored. …”
Get full text
Get full text
Thesis
