Search Results - (( program data detection algorithm ) OR ( java data normalization algorithm ))*
Search alternatives:
- normalization algorithm »
- data normalization »
- data detection »
- program data »
- java »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…This certainly needs further considerations on characteristics of the erroneous data. Thus, a post-processing program was developed to detect and discard the MBES far outliers based on behaviours of propagated beam in the multibeam sonar system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. The results show the algorithm's impressive performance with an 86% precision in predicting ASD traits. …”
Get full text
Get full text
Thesis -
6
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…However, every single tool has different ways of detection and accuracy of the detection. This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
8
-
9
-
10
-
11
-
12
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…This problem occurs due to lacking of existing system in detecting children image in a car. Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
14
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
15
-
16
Adaptive algorithms for automated intruder detection in surveillance networks
Published 2014Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
Get full text
Get full text
Article -
19
-
20
