Search Results - (( risk detection method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- method algorithm »
- java application »
- using algorithm »
- risk detection »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
6
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
Get full text
Get full text
Get full text
Thesis -
10
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Conference or Workshop Item -
11
Slope inspection system using image processed by machine learning algorithm to determine risk of slope failure
Published 2020“…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff
Published 2007“…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
Get full text
Get full text
Thesis -
14
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Slope inspection system: using image processed by machine learning algorithm to determine risk of slope failure
Published 2020“…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
