Search Results - (( key detection using algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- key detection »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Asymmetric key algorithm is also known as public-key cryptography, is a class of cryptographic algorithms with require two separate keys, one is secret (private) key and another one is public key. …”
Get full text
Get full text
Thesis -
7
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
8
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
9
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
10
Improving intrusion detection using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one of the key security components in today’s networking environment. …”
Get full text
Get full text
Get full text
Article -
11
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A novel algorithm to detect a QPSK signal with the minimum number of samples
Published 2015“…The algorithm was simulated and tested using ANSI C++. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
Robust automatic multi-camera viewpoint stabilization using Harris laplace corner detection and spanning tree
Published 2018“…It can automatically simplify the region of interest with unique key-points matching. Harris Laplace corner detection has been used to find accurate matching key points for different photometric changes, scaling in images. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Landmark detection for vision based of autonomous guided vehicle
Published 2012“…The algorithm is developed not only to detect and recognize but also to distinguish landmark from non-landmark. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
Get full text
Get full text
Get full text
Get full text
Article
