Search Results - (( defect classification model algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1
  2. 2

    Software defect prediction framework based on hybrid metaheuristic optimization methods by Wahono, Romi Satria

    Published 2015
    “…The classification algorithm is a popular machine learning approach for software defect prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    The formulation of a transfer learning pipeline for the classification of the wafer defects by Lim, Shi Xuen

    Published 2023
    “…Automated processes have been used commonly in recent years, with the judgement done by using conventional image processing algorithm. However, limitations such as robustness and difficulty in setting up the parameters required for image processing algorithm encourages the investigation in using Deep learning classification in detecting the wafer defects. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Cross-project software defect prediction by Bala, Yahaya Zakariyau, Abdul Samat, Pathiah, Sharif, Khaironi Yatim, Manshor, Noridayu

    Published 2022
    “…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
    Get full text
    Get full text
    Article
  5. 5

    Machine learning application for concrete surface defects automatic damage classification by Syahrul Fithry Senin, Khairullah Yusuf, Amer Yusuf, Rohamezan Rohim

    Published 2024
    “…Therefore, a Machine Learning classifier for concrete surface defect classification using the Discriminant Analysis Classifier was introduced to more accurately extract the types of concrete surface defects information from the digital images. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects by Zuwairie, Ibrahim, Tan, Shing Chiang, Watada, Junzo, Marzuki, Khalid

    Published 2014
    “…In particular, both the FAM models and hybrid genetic algorithms are integrated in the proposed evolutionary artificial neural networks (EANNs) to classify an imbalanced data set. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Identifying Damage Types in Solar Panels Through Surface Image Analysis with Naive Bayes by Wiliani, Ninuk, T.K.A, Rahman, Ramli, Suzaimah

    Published 2024
    “…This work illustrates the potential of statistical feature extraction approaches for defect classification, while emphasizing the necessity for future improvements to boost the efficacy of feature extraction and classification techniques in practical applications.…”
    Get full text
    Get full text
    Get full text
    Journal
  10. 10

    Automated mold defects classification in paintings: a comparison of machine learning and rule-based techniques. by Mohamad Hilman, Nordin *, Bushroa, Abdul Razak, Norrima, Mokhtar, Mohd Fadzil, Jamaludin, Adeel, Mehmood

    Published 2025
    “…Subsequently, these regions are classified as mold defects using either morphological filtering or machine learning models such as Classification and Regression Trees (CART) and Linear Discriminant Analysis (LDA). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Heart sound diagnosis using nonlinear ARX model / Noraishah Shamsuddin by Shamsuddin, Noraishah

    Published 2011
    “…This thesis presents a research work on a diagnosis system for heart sound based on nonlinear ARX (NARX) model. The system uses neural network for model estimation and classification of several heart diseases. …”
    Get full text
    Get full text
    Thesis
  12. 12

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Identification of weld defect through the application of denoising method to the sound signal acquired during pulse mode laser welding by Yusof, M. F.M., Quazi, M. M., Aleem, S.A.A., Ishak, M., Ghazali, M. F.

    Published 2023
    “…The root-mean-square and spectral entropy of both unfiltered and filtered signals were extracted, and classification models were developed using these data sets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Heart sound diagnosis using nonlinear arx model / Noraishah Shamsuddin by Shamsuddin, Noraishah

    Published 2012
    “…This thesis presents a research work on a diagnosis system for heart sound based on nonlinear ARX (NARX) model. The system uses neural network for model estimation and classification of several heart diseases. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Low altitude multispectral mapping for road defect detection by Shahrul Nizan Abd Mukti, Khairul Nizam Tahar

    Published 2021
    “…Pothole’s defect is major damages indicated the road condition visually, and the structural defects due to some potential causes. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20