Search Results - (( java application using algorithm ) OR ( parameter detection computer algorithm ))
Search alternatives:
- parameter detection »
- java application »
- using algorithm »
-
1
-
2
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021Get full text
Get full text
Get full text
Article -
3
A new corner detection algorithm for chain code representation.
Published 2005“…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
Get full text
Get full text
Article -
4
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
5
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The algorithms based on image feature detection and matching are critical in the field of computer vision. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
8
-
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Soft Set Decision/Forecasting System Based on Hybrid Parameter Reduction Algorithm
Published 2017“…Although the decomposition scenario in the previous algorithms detects the reduction, it could not obtain the optimal decision. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
-
15
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
16
A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
Get full text
Get full text
Conference or Workshop Item -
18
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…This study explains in detail how fuzzy modeling works by using FA for detecting phishing. Phishing is an unsettled security problem that occurs in the world of internet connected computers. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…This situation makes the detection of cyber-based attacks on computer networks a relevant and challenging area of research. …”
Get full text
Get full text
Thesis
