Search Results - (( process detection drops algorithm ) OR ( java application using algorithm ))
Search alternatives:
- process detection »
- java application »
- detection drops »
- using algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…Packet-based detection processes every payload on the wire, which degrades the performance of network intrusion detection system (NIDS). …”
Get full text
Get full text
Get full text
Thesis -
6
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…The results obtained were satisfying, where the algorithm were able to detect and remove the rain streaks without losing the aliveness of the scene. …”
Get full text
Get full text
Thesis -
7
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
Get full text
Get full text
Get full text
Article -
8
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…To address this problem, we provide suggestions for mitigating data leakage in the training process and analyzing the sensitivity of different algorithms. …”
Get full text
Get full text
Article -
9
ACCURACY ENHANCEMENT OF OMR FOR EXAM MARKING WITHOUT PRE-SET TEMPLATE USING IMAGE PROCESSING
Published 2019“…The results were compared against manual marking as the control and existing image processing algorithms. The metrics used are F1 score and percentage error for accuracy of detected answer options and marking fault respectively. …”
Get full text
Get full text
Final Year Project -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…Tube B images are needed to evaluate the performance of the developed defect detection algorithm under different radiography conditions. …”
Get full text
Monograph -
13
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
16
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Objectives: An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm, signal drop and network breakdown. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
