Search Results - (( program detection method algorithm ) OR ( java application design algorithm ))
Search alternatives:
- application design »
- program detection »
- method algorithm »
- java application »
- design algorithm »
-
1
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
Multicolour object detection using multithreading
Published 2015“…This paper presents the method of detecting multicolour objects and the processing time comparisons of designed algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
10
-
11
Analysis Of Human Detection Method In Social Distancing Monitoring
Published 2022“…For future planning, datasets need to be around thousand images for the training process to make the detection accuracies increase. This study concludes that the use of current proposed object detection algorithms can be used to detect humans and the Euclidean distance method is successfully implemented together with the object detection algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…The result shows that with native programming on Android platform, even a complicated object detection algorithm can be done in real-time.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…This paper presents and investigates the Reactive Power imbalance Method for islanding detection. The passive algorithm implements in this paper due to the low cost operation, however it got the higher non-detection zone (NDZ) and slower response time compare some active methods. …”
Get full text
Get full text
Get full text
Article -
14
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…This problem occurs due to lacking of existing system in detecting children image in a car. Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
Get full text
Get full text
Thesis -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…This thesis provided a detailed method in implementing the algorithm for face and person recognition by using haar cascade classifier feature detection and contour approximation. …”
Get full text
Get full text
Monograph -
17
-
18
-
19
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
20
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
