Search Results - (( developing building detection algorithm ) OR ( java application using algorithm ))
Search alternatives:
- building detection »
- java application »
- using algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Building detection using object-based Image analysis (OBIA) and machine learning (ML) algorithms / Hanani Mohd Shahar
Published 2020“…The information of building features especially in the urban area is very important to support urban management and development. …”
Get full text
Get full text
Thesis -
6
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
7
Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application
Published 2016“…The increasing number of missing kid from days to days is become main concern for parents. Hence, „Detecting Indoor Positioning of Moving Object using Wi-Fi Triangulation Algorithm for Kid Tracker Application‟ as a part of process in Kid Tracker Application to keep track our kids movement by focusing inside the building (shopping mall). …”
Get full text
Get full text
Undergraduates Project Papers -
8
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
Get full text
Get full text
Thesis -
9
A new intelligent multilayer framework for insider threat detection
Published 2021“…Subsequently, using the K-Nearest Neighbors algorithm, an anomaly insider threat detection algorithm has been developed. …”
Get full text
Get full text
Get full text
Article -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Motion detection and simulation study on human walking behavior
Published 2012“…Two types of environments are developed in the simulation to study the human walking behaviour which are empty space and building simulation. …”
Get full text
Get full text
Thesis -
13
A new approach to highway lane detection by using hough transform technique
Published 2017“…This paper presents the development of a road lane detection algorithm using image processing techniques.This algorithm is developed based on dynamic videos, which are recorded using on-board cameras installed in vehicles for Malaysian highway conditions.The recorded videos are dynamic scenes of the background and the foreground, in which the detection of the objects, presence on the road area such as vehicles and road signs are more challenging caused by interference from background elements such as buildings, trees, road dividers and other related elements or objects. …”
Get full text
Get full text
Get full text
Article -
14
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
Published 2023“…Unmanned Aerial Vehicles (UAV) can automate, avoid visual inspection, and avoid other physical check-ups of these buildings. Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. …”
Get full text
Get full text
Get full text
Article -
15
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. …”
Get full text
Get full text
Article -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
Get full text
Get full text
Get full text
Article
