Search Results - (( java implication drops algorithm ) OR ( software detection using algorithm ))
Search alternatives:
- software detection »
- implication drops »
- java implication »
- using algorithm »
-
1
Real-Time Face Detection And Tracking Using Software And Hardware Design
Published 2018“…For FPGA implementation the entire face detection algorithm was implemented on Cyclone IV FPGA device using Altera DE2-115. …”
Get full text
Get full text
Monograph -
2
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Hence, we propose a framework to detect ambiguity on SRS using supervised machine learning technique. …”
Get full text
Get full text
Get full text
Thesis -
3
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…The results show the algorithm used in this research can reduce the test suite size as well as significantly improve the fault detection effectiveness. …”
Get full text
Get full text
Thesis -
4
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
Get full text
Get full text
Thesis -
5
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
8
-
9
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…In my final year project, the purpose of project is reconstruct the I/V converter by using op-amp chip other than LM741 and the algorithm for detect location of photodiode is implement by LabVIEW software. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
12
-
13
Implementing a T-Way Test Generation Strategy Using Bees Algorithm
Published 2013“…In order to ensure software performance as well as software quality, various testing techniques have been used to detect faults as early and as many as possible during the development phase. …”
Get full text
Get full text
Get full text
Article -
14
Implementing a t-way test generation strategy using bees algorithm
Published 2023“…In order to ensure software performance as well as software quality, various testing techniques have been used to detect faults as early and as many as possible during the development phase. …”
Article -
15
-
16
Intruder detection using histogram and edge detection algorithms
Published 2016Get full text
Get full text
Undergraduates Project Papers -
17
Web Camera Application For Motion Detection
Published 2003“…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
