Search Results - (( developing risk detection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, M. Mahadi

    Published 2018
    “…The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, Muhammad Mahadi

    Published 2018
    “…The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection by Ng, Shi Ya

    Published 2022
    “…The significance of the extracted output is evaluated with the topic modelling algorithm (LDA model algorithm) for the purpose of predictive supply risk. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Early diabetes risk prediction using Ant Colony Optimization algorithm / Nur Aisyatul Husna Ahmad Yusri and Rizauddin Saian by Ahmad Yusri, Nur Aisyatul Husna, Saian, Rizauddin

    Published 2023
    “…Therefore, this study has developed a classification model for predicting early diabetes risk using an Ant Colony Optimization (ACO) algorithm. …”
    Get full text
    Get full text
    Book Section
  10. 10
  11. 11

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…These alarms serve as an early warning for the system operator or owner, allowing them to take any necessary actions to address the risk. After testing, our developed system has demonstrated an impressive accuracy of 92.5% in detecting abnormal behaviours in 40 video inputs.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…However,there is the issue of noisy dataset detected as incomplete data and the outlier class problem that affects sampling bias.Existing frameworks were deemed difficult in identifying the critical risk factors of diabetes;some of which were considerably inaccurate and consume substantial computation time.The purpose of this study is to develop a suitable framework for predicting diabetes risks.From a complete blood test,the framework can predict and classify the output of either having diabetes risk or no diabetes risk.A Diabetes Risk Prediction Framework (DRPF) was developed from the literature review and case studies were afterwards conducted in three private hospitals in Semarang.Analyses were conducted to find a suitable component of the framework—due to lack of comparison and analysis on the combination of feature selection and classification algorithm.DRPF comprises four main sections: pre-processing,outlier detection,risk weighting,and learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Based on the result, we developed a prototype tool called detection on ambiguous SRS written in Malay using machine learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
    Get full text
    Get full text
    Article
  16. 16

    A wheelchair sitting posture detection system using pressure sensors by Mohamad Yusoff, Muhammad Annuar Alhadi, Azmi, Nur Liyana, Nordin, Nor Hidayati Diyana

    Published 2024
    “…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…This study focussed on Industrial Risk, Financial Flexibility, Credibility, Management Risk, Operating Risk, and Competitiveness. …”
    Get full text
    Get full text
    Student Project
  18. 18

    System setup on jetson nano for smart crowd covid monitoring system by Muhammad Othman, Maliki

    Published 2022
    “…Each grid cell is in charge of detecting objects within itself. Because of its speed and accuracy, YOLO is one of the most well-known object detection algorithms. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…To achieve this aim, this study proposed a novel framework, which combines three models: Spam Account Detection Model (SADM), Spam Message Detection Model (SMDM), and Spam Risk Assessment Model (SRAM). …”
    Get full text
    Get full text
    Get full text
    Thesis