Search Results - (( developing function acs algorithm ) OR ( java detection system algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The experimental results show that the blood vessel detection system has worked well in the ARM platform with the Android OS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…This thesis thus proposes suitable methods to reduce power consumption in Viterbi decoder by enhancing the ACS and PMU module. For ACS, the traditional method of Viterbi algorithm is to add the previous state metric with the current branch metric, compare the new branch metric and select the minimum branch metric. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Development of a Sensor to Detect Condensation of Super-Sonic Steam by Khan, A., Sanaullah, K., Ul Haq, N.

    Published 2013
    “…This paper explains the development and functioning of AC driven electrodes based sensor which is used for the study of condensation phenomena of steam. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Solar power inverter by Mohd Hafizuddin, Mohamed Ariffin

    Published 2013
    “…The controller executes the very precise algorithms required to invert the DC voltage generated by the solar module into AC This controller is programmed to perform the control loops necessary for all the power management functions necessary including DC/DC and DC/AC.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach by Premkumar M., Hashim T.J.T., Ravichandran S., Sin T.C., Chandran R., Alsoud A.R., Jangir P.

    Published 2025
    “…The application of the recently developed flow direction algorithm, including its multi-objective variant with an �-based constraint-handling mechanism to OPF problem is the primary contributions of this work. …”
    Article
  13. 13

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad... by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…The CISOS integrates the element of Chaotic Local Search and cloning into the original SOS algorithm. The performance of proposed CISOS technique has been assessed by using various benchmark test functions in terms of its ability to find the actual global minimum point of the test functions as well as the computational time required to find the minimum point. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…A robotic hardware system has been developed using LEGO Mindstorm kit. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17
  18. 18

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah by Abdullah, Muhamad Faizol Adli

    Published 2010
    “…Two model have been develop: Classical Artificial Neural Network (ANN) and Particle Swarm Optimization (PSO) for the prediction of total AC power output from a grid connected photovoltaic system. …”
    Get full text
    Get full text
    Thesis