Search Results - (( programmes based detection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- function algorithm »
- programmes based »
- based detection »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
An FPGA based embedded vision system for real-time motion detection
Published 2015“…This paper proposes an efficient FPGA (Field Programmable Gate Array) based real time video processing platform for monocular object detection. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
-
4
Implementation of Real-time Simple Edge Detection on FPGA
Published 2005“…The objective of this paper was to develop a real time hardware image processing system which is based on Field Programmable Gate Array (FPGA). The chosen image processing algorithms implemented was edge detection. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Implementation of real-time simple edge detection on FPGA
Published 2007“…The objective of this paper was to develop a real time hardware image processing system which is based on Field Programmable Gate Array (FPGA). The chosen image processing algorithms implemented was edge detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
IMAGE PROCESSING ALGORITHMS ON FPGA
Published 2007“…The objective of this project is to construct a real time hardware image processing system which based on Field Programmable Gate Array (FPGA). The chosen image processing algorithms are implemented on two systems which are Color Filtering System and Edge Detection System. …”
Get full text
Get full text
Final Year Project -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Low area Programmable Memory Built-In Self-Test (PMBIST) for small embedded ram cores / Nur Qamarina Mohd Noor
Published 2013“…The memory BIST applies various test algorithms such as MARCH tests to detect various RAM faults. …”
Get full text
Get full text
Thesis -
11
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
12
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
13
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
14
Development of shape pattern recognition for fpga-based embbeded object tracking system
Published 2010“…This project presents FPGA (Field Programmable Gate Array) based solution for an embedded object tracking system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. The data used in training and testing was KDD 99 data set based on the Defense Advanced Research Projects Agency (DARPA) intrusion detection programme, which is publicly accessible by Lincoln Labs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. The data used in training and testing was KDD 99 data set based on the Defense Advanced Research Projects Agency (DARPA) intrusion detection programme, which is publicly accessible by Lincoln Labs. …”
Get full text
Get full text
Get full text
Article -
17
New CFAR algorithm and circuit development for radar receiver
Published 2020“…The field-programmable gate array FPGA chip that is used to implement the MSS-CA-CFAR algorithm needs only three signals from the radar receiver to match with the receiver circuit correctly which are time base clock signal period reset trigger signal and the pulse duration time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis
