Search Results - (( developing prioritizing detection algorithm ) OR ( java application interface algorithm ))
Search alternatives:
- prioritizing detection »
- java application »
-
1
Evolutionary cost cognizant regression test prioritization for object-oriented programs based on fault dependency
Published 2018“…Furthermore, they did not consider incorporating evolution process such as applying genetic algorithms to their technique. In this work, we proposed an evolutionary cost-cognizant regression testing approach that prioritizes test case according to the rate of severity detection of test cases connected with dependent faults using genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
2
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
4
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The results of The Average Percentage of Fault Detected (APFD) of the Test case prioritization by the Manhattan Distance matrix have obtained a higher value, validating its hypothesized effectiveness.…”
Get full text
Get full text
Get full text
Article -
5
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
7
An estimation algorithm for improved maritime obstacle detection
Published 2024“…A specialized ROS node facilitates data fusion by prioritizing ZED2I camera data, enhancing detection accuracy through comparisons with LiDAR data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
10
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran
Published 2023“…It uses YOLOv5 object detection and classification algorithm. This project uses the images of paper, plastic and metal gathered from Kaggle and GitHub dataset. …”
Get full text
Get full text
Thesis -
14
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
17
Vader lexicon and support vector machine algorithm to detect customer sentiment orientation
Published 2023“…Background: The concept of customer orientation, which is based on a set of fundamental beliefs that prioritize the interests of the customer, requires companies to detect these interests in order to maintain a high level of quality in their products or services. …”
Get full text
Get full text
Get full text
Article -
18
Real time monitoring system for elderly
Published 2024“…This project is notable for using Raspberry Pi, GPS and advanced fall detection algorithms for accurate tracking. Software was developed using the Geany IDE for versatility and seamless integration in numerous care scenarios. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
