Search Results - (( java application a algorithm ) OR ( data detection modified algorithm ))
Search alternatives:
- detection modified »
- java application »
- data detection »
- application a »
- a algorithm »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
3
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015“…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…It is also concluded that the modified algorithms have the sensitivity to detect the damage regardless of its severity. …”
Get full text
Get full text
Article -
6
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…Rapid growth of multimedia data in cyberspace caused a swift rise in data transmission volume. …”
Get full text
Get full text
Get full text
Thesis -
8
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…Therefore, the robust location and covariance matrix based on the MRFCH is used instead of the classical estimators to tackle these problems. The proposed algorithm has been applied to detect outliers in the high dimensional data. …”
Get full text
Get full text
Thesis -
9
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
10
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
Get full text
Get full text
Thesis -
11
-
12
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
13
Investigation Of Edge Detection Techniques Based On Brain Tumor Images
Published 2018“…The images undergo three fundamental steps of edge detection techniques. The edge detection operators used to detect the brain tumor are Robert zero-crossing, Sobel operator, Prewitt operator, Canny operator and modified Canny algorithm. …”
Get full text
Get full text
Monograph -
14
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
Get full text
Get full text
Thesis -
15
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
16
Testing static single cell faults using static and dynamic data background
Published 2011“…A conventional March Test Algorithm can be modified by using the DB management scheme to form a new March Test Algorithm (referred to as Mod March Test Algorithm), e.g., MATS++(6N) becoming Mod MATS++(6N). …”
Get full text
Get full text
Conference or Workshop Item -
17
Modified sequential fences for identifying univariate outliers
Published 2016“…Moreover, we proposed a new method with modified algorithm and methodology namely bootstrap sequential fences. …”
Get full text
Get full text
Thesis -
18
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
Get full text
Get full text
Thesis -
19
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
20
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article
