Search Results - (( develop finding detection algorithm ) OR ( java _ function algorithm ))

Refine Results
  1. 1

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…An algorithm for the design object detection systems is presented. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…The results produced by the tools are then validated with other research finding. This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…However, the MBGWO has several issues in finding a good quality solution. Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…This have attracted researchers to find algorithms and methods that can detect intrusions in a short period of time within a huge volume of data with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
    Get full text
    Get full text
    Thesis
  12. 12

    MelScan: An Android Application for Early Detection of Melanoma by Nyambang, Edwin

    Published 2014
    “…To do this, a market research was carried to find out what were the available applications that were out there in the Google Playstore (also known as Google Market) that was also used for early detection of melanoma, before comparing the types of available image processing algorithms that was to be used during the development phase. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Wood texture detection with conjugate gradient neural network algorithm by Widyarto, Setyawan, Suryasa, I. Nyoman, Khairul Annuar, Abdullah, Fajarianto, Otto, Mohd Shafry, Mohd Rahim, Priyandoko, Gigih, Budaya, Gilang Anggit

    Published 2017
    “…This project explored fundamental methods to find the factors that can be used in classifying and detecting the type of wood. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…There were also identification of factors that influence fraud activity, review existing fraud detection models, develop the detection model and implement it using a well-known tool in the market namely Rapidminer. …”
    text::Thesis
  16. 16

    Evaluating Machine Learning Algorithms for Fake Currency Detection by Keerthana, S.N, Chitra, K.

    Published 2024
    “…Our findings contribute to developing reliable, automated systems for counterfeit detection, and enhancing financial security…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…Edge detection is the process of finding sharp contrasts in intensities in an image. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…Movie Recommendation System is essentially developed for the purpose of producing a movie recommendation list therefore, it is paired with algorithm to provide the desired functionalities and features in the system. …”
    Get full text
    Get full text
    Thesis