Search Results - (( developing rule detection algorithm ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- java application »
- developing rule »
- rule detection »
-
1
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The developed algorithm is expected to enhance the safety of operation in oleochemical industry. …”
Get full text
Get full text
Thesis -
2
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Using Heuristic Rules from Sentence Decomposition of Experts' Summaries to Detect Students' Summarizing Strategies
Published 2008“…We developed an algorithm based on the heuristic rules and performed some experiments to evaluate and support the technique proposed.…”
Get full text
Get full text
Article -
4
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
5
Rule based signal processing for ambulatory fetal monitoring
Published 2004Get full text
Get full text
Get full text
Article -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Car plate detection system
Published 2005“…Finally, the location of the car plate is located using rule based algorithms. The conditions are set as rule and the system detects the car plate if the condition exists. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…This experiment used real 3799 Android samples with 217 features and achieved the best accuracy rate of detection of more than 98% by using Unordered Fuzzy Rule Induction (FURIA).…”
Get full text
Get full text
Get full text
Article -
9
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
Get full text
Get full text
Article -
10
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
Get full text
Get full text
Student Project -
11
Detecting the probability of diabetic retinopathy / Nurul Farhanah Khairol Nizar
Published 2020“…The purpose of this project is to develop a system to help in detecting the possibility of having Diabetic Retinopathy using rule-based system on web-based application. …”
Get full text
Get full text
Thesis -
12
Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan
Published 2017“…The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
Get full text
Get full text
Thesis -
13
-
14
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
15
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Finally, based on the SQ generation rule, and the development of the DB generator, MTAs are generated. …”
Get full text
Get full text
Thesis -
16
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…Stemming algorithm have been developed in many different languages. …”
Get full text
Get full text
Thesis -
18
-
19
Predicting heart disease using ant colony optimization / Siti Aisyah Ismail
Published 2021“…Thus, this study used the Ant Colony Optimization algorithm with data mining called Ant-Miner to predict heart disease because it is said that Ant-Miner’s rule list is simpler than other rule induction algorithms. …”
Get full text
Get full text
Student Project -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
