Search Results - (( developing rule detection algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…The developed algorithm is expected to enhance the safety of operation in oleochemical industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  8. 8

    Dingle's Model-based EEG Peak Detection using a Rule-based Classifier by Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2015
    “…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Using Heuristic Rules from Sentence Decomposition of Experts' Summaries to Detect Students' Summarizing Strategies by Idris, N., Baba, S., Abdullah, R.

    Published 2008
    “…We developed an algorithm based on the heuristic rules and performed some experiments to evaluate and support the technique proposed.…”
    Get full text
    Get full text
    Article
  10. 10

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Car plate detection system by Gunasegaran, Krishnan

    Published 2005
    “…Finally, the location of the car plate is located using rule based algorithms. The conditions are set as rule and the system detects the car plate if the condition exists. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA) by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Azlee, Zabidi, Ferda, Ernawan, Syifak, Izhar Hisham, Mohd Faizal, Ab Razak

    Published 2023
    “…This experiment used real 3799 Android samples with 217 features and achieved the best accuracy rate of detection of more than 98% by using Unordered Fuzzy Rule Induction (FURIA).…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
    Get full text
    Get full text
    Article
  16. 16

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Detecting the probability of diabetic retinopathy / Nurul Farhanah Khairol Nizar by Khairol Nizar, Nurul Farhanah

    Published 2020
    “…The purpose of this project is to develop a system to help in detecting the possibility of having Diabetic Retinopathy using rule-based system on web-based application. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan by Ruslan, Muhammad Rushamir Hakimi

    Published 2017
    “…The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20