Search Results - (( pattern detection schemes algorithm ) OR ( java application using algorithm ))
Search alternatives:
- pattern detection »
- detection schemes »
- schemes algorithm »
- java application »
- using algorithm »
-
1
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
Get full text
Get full text
Monograph -
2
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
3
A Distributed Event Detection Scheme for Wireless Sensor Networks
Published 2009“…We propose a low-computation, distributed, and lightweight event detection scheme in wireless sensor networks, which is adopted from the pattern recognition scheme known as Distributed Hierarchical Graph Neuron. …”
Get full text
Get full text
Conference or Workshop Item -
4
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
Published 2013“…This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. …”
Get full text
Get full text
Conference or Workshop Item -
5
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
6
Anomaly detection through spatio-temporal context modeling in crowded scenes
Published 2014“…By combining the determinations from the two stages, a weighted scheme is proposed to automatically detect anomaly events from crowded scenes. …”
Get full text
Get full text
Conference or Workshop Item -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…In this paper we present three software-based agents built using kernel machines to perform automated, real-time intruder detection in surveillance systems. Kernel machines provide a powerful data mining technique that may be used for pattern matching in the presence of complex data. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…These schemes follow a uniform framework,which is based on the detection of feature points which are commonly invariant to Rotation,Scaling and Translation (RST),therefore they naturally accommodate the framework of geometrically robust image watermarking. …”
Get full text
Get full text
Thesis -
13
Handwriting Recognition Using Artificial Neural Network
Published 2004“…This network is trained using the Back-Propagation algorithm to identify similarities and patterns among different handwriting samples. …”
Get full text
Get full text
Final Year Project -
14
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The first step is devoted to detecting invisible patches. Further, an efficient color contrast scheme is proposed. …”
Get full text
Get full text
Thesis -
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
17
-
18
-
19
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…Traditional rule-based anti-money laundering (AML) systems are static and unable to effectively detect the novel tactics involved in modern money laundering schemes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
