Search Results - (( developing factor detection algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…Our aim of this research is to compare and evaluate both Jaccard and Manhattan Distance algorithms in terms of their effectiveness to formulate the enhancement of the previous multi-factor weighted Approach. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques by Mohammad Syawaludin Syafiq, Hassan

    Published 2016
    “…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula by Francis Xavier, Sam Daniel

    Published 2020
    “…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of a flexible video analysis system for motion detection and alarm generation by Shafie, Amir Akramin, Ali, Md. Hazrat, Hafiz, Fadhlan, Mat Ali, Roslizar

    Published 2010
    “…This research has focused these factors at two levels, algorithm level and software level. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The new assessments on the capability of the indicator to detect and quantify the defects are performed. For this purpose, the FEM is implemented to model three communication towers with a height of 15, 30, and 45m to develop the frequency correlation factor. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Wood texture detection with conjugate gradient neural network algorithm by Widyarto, Setyawan, Suryasa, I. Nyoman, Khairul Annuar, Abdullah, Fajarianto, Otto, Mohd Shafry, Mohd Rahim, Priyandoko, Gigih, Budaya, Gilang Anggit

    Published 2017
    “…This project explored fundamental methods to find the factors that can be used in classifying and detecting the type of wood. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Forgery detection in medical images using Complex Valued Neural Network (CVNN) by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Zeki, Akram M., Aburas, Abdurazzag Ali

    Published 2011
    “…Ability of the algorithm to localize modification undergone makes it a unique and efficient algorithm for authentication and tamper detection as well as blind detection applications.…”
    Get full text
    Get full text
    Get full text
    Article