Search Results - (( partner detection method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- partner detection »
- method algorithm »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
7
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023Conference Paper -
8
-
9
Development of Real-Time Eye Tracking Algorithm
Published 2021Get full text
Get full text
Conference or Workshop Item -
10
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Conference Paper -
11
-
12
-
13
Artificial neural networks and genetic algorithm for transformer winding/insulation faults
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
-
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
Identification of power poles based on satellite stereo images using graph-cut algorithm
Published 2023Conference Paper -
20
Feature selection in intrusion detection, state of the art: A review
Published 2016Get full text
Get full text
Article
