Search Results - (( basic detect selection algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- selection algorithm »
- java implementation »
- detect selection »
- during algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
3
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
4
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Three types of March algorithms which are March 17N, March 12N and MarchPS 23N are selected to validate the tool in term of their compatibility for NPSF detection and diagnosis.Suitable data background is identified and a test procedure is developed for each algorithm. …”
Get full text
Get full text
Thesis -
5
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…An approach that detects steady state value for calling genetic algorithm (GA) is proposed to overcome the problems of good classifiers deletion and the local minima trap. …”
Get full text
Get full text
Thesis -
6
-
7
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
9
Moving detection using cellular neural network (CNN)
Published 2008“…The video then are segmented into images using SC Video Developer. Ten images are selected to be used in this project. The algorithm created is used to detect the ball in the images. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
Get full text
Get full text
Thesis -
11
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Classification of herbs plant diseases via hierarchical dynamic artificial neural network
Published 2010“…This paper is to propose an unsupervised diseases pattern recognition and classification algorithm that is based on a modified Hierarchical Dynamic Artificial Neural Network which provides an adjustable sensitivity-specificity herbs diseases detection and classification from the analysis of noise-free colored herbs images. …”
Get full text
Get full text
Article -
15
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
16
Early detection of spots high water saturation for landslide prediction using thermal imaging analysis
“…Hence, to solve this issue, this study investigates a new method to detect water saturation spots which is integrated with a thermal image camera to provide early detection of landslide. …”
Get full text
Get full text
Research Report -
17
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
18
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Secondly, this report will review the literature part which started with basic knowledge of data mining and knowing what the basic information about data mining. …”
Get full text
Get full text
Thesis -
19
Classification of herbs plant diseases via hierachical dynamic artificial neural network after image removal using kernel regression framework
Published 2011“…This paper is to propose an unsupervised diseases pattern recognition and classification algorithm that is based on a modified Hierarchical Dynamic Artificial Neural Network which provides an adjustable sensitivity-specificity herbs diseases detection and classification from the analysis of noise-free colored herbs images. …”
Get full text
Get full text
Article -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
