Search Results - (( pre detection based algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- detection based »
- using algorithm »
- pre detection »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
3
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The algorithms to be developed will consist of pre-processing, enhancement and image segmentation. …”
Get full text
Get full text
Monograph -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
8
A new corner detection algorithm for chain code representation.
Published 2005“…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
Get full text
Get full text
Article -
9
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In the future, it is expected that the detection from a tracking algorithm will automatically switch the traffic light signals based on the road conditions. …”
Get full text
Get full text
Thesis -
10
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
Get full text
Get full text
Conference or Workshop Item -
12
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…One YOLOv8 based model was developed for detecting and segmenting ginger plants in various growth states. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Embedded Fuzzy Classifier for Detection and Classification of Preseizure state using Real EEG data
Published 2014“…In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
Get full text
Get full text
Book Section -
15
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…However, the damage done by crypto-ransomware is almost impossible to reverse, and there is a need for an early detection mechanism. For early detection of crypto-ransomware, behavior-based detection techniques are the most effective. …”
Get full text
Get full text
Get full text
Article -
16
A new vertical edge detection algorithm and its application
Published 2008“…We proposed a new and fast vertical edge detection algorithm (VEDA) which is based on the contrast between the gray scale values. …”
Get full text
Get full text
Conference or Workshop Item -
17
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…One YOLOv8 based model was developed for detecting and segmenting ginger plants in various growth states. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Embedded Fuzzy Classifier for Detection and Classification of Preseizure State Using Real EEG Data
Published 2013“…In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
Get full text
Get full text
Get full text
Book Section -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
