Search Results - (( program _ detection algorithm ) OR ( java data function algorithm ))*
Search alternatives:
- function algorithm »
- data function »
- java »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…Programming software is required in order to execute the image acquisition and image analysis algorithm. …”
Get full text
Get full text
Monograph -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Thesis -
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
8
An optimal mesh algorithm for remote protein homology detection
Published 2011“…This paper also shows that the use of the refinement algorithm increases the performance of the multiple alignments programs by at least 4%.…”
Get full text
Get full text
Article -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Multicolour object detection using multithreading
Published 2015“…The number of threads created in multithreading’s algorithm is depending on the number of colours to be detected. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
12
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. The results show the algorithm's impressive performance with an 86% precision in predicting ASD traits. …”
Get full text
Get full text
Thesis -
13
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
14
-
15
Needleman wunsch implementation for SPAM/UCE inline filter
Published 2024Subjects:Conference Paper -
16
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Subjects:Article -
20
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Get full text
Get full text
Thesis
