Search Results - (( quality detection method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- quality detection »
- method algorithm »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Quality assessment methods to evaluate the performance of edge detection algorithms for digital image: a systematic literature review
Published 2021“…Quality assessment methods to evaluate the performance of edge detection algorithms for digital image: a systematic literature review by Haidi Ibrahim…”
Get full text
article -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…In this study, we analyze the best object detection algorithm with respect to efficiency, quality and robustness of the object detection. …”
Get full text
Get full text
Conference or Workshop Item -
6
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. …”
Get full text
Get full text
Article -
8
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…In this study, we analyze the best object detection algorithm with respect to efficiency, quality and robustness of the algorithm. …”
Get full text
Get full text
Article -
9
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. …”
Get full text
Get full text
Thesis -
10
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
Get full text
Get full text
Get full text
Thesis -
11
Automatic Textile Stain Detection Using Yolo Algorithm
Published 2024“…Automatic textile stain detection is essential for optimizing the quality control process within the textile industry. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Vader lexicon and support vector machine algorithm to detect customer sentiment orientation
Published 2023“…Objective: The objective of this study is to detect customer orientation towards product or service quality, as expressed in online or social media. …”
Get full text
Get full text
Get full text
Article -
14
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
15
LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO
Published 2010“…This research focuses on correspondence, proposing an algorithm to improve such detection for low quality cameras (webcams) while trying to achieve real-time image processing. …”
Get full text
Get full text
Thesis -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
17
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
Get full text
Get full text
Thesis -
18
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The results showed the effectiveness of the proposed method for detecting multiple clusters in a spatiotemporal space. …”
Get full text
Get full text
Article -
19
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The results showed the effectiveness of the proposed method for detecting multiple clusters in a spatiotemporal space. …”
Get full text
Get full text
Article -
20
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis
