Search Results - (( developing sets detection algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat by Assaig, Faisal Ahmed, Gunawan, Teddy Surya, Nordin, Anis Nurashikin, Ab Rahim, Rosminazuin, Mohd Zain, Zainiharyati

    Published 2023
    “…In light of this, our research project aimed to develop and evaluate a highly efficient desktop application meticulously designed for a SARS-CoV-2 testing device based on electrochemical potentiostat principles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  5. 5

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  6. 6

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…In this study, 227 volumes of brain CT images were used to develop and validate the CAD. The new develop algorithm is set to register image of brain patient in order to determine the rotation angle for brain realignment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…In this paper, three widely used feature detection algorithms, SURF, BRISK and FAST, these algorithms are compared to calculate the processing time and accuracy for set of signatures correctly. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Therefore, there is a need to find a new valuation method that does not require large data sets yet yields the same results. Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  12. 12

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi by Ahmad Tarmizi, Muhammad Danial

    Published 2020
    “…The predictive model success in detecting and classifying the snake. The model achieve 96.89 % of accuracy percentage in training set and 96% of accuracy from testing set. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD simulation model has been developed to test the algorithm on NRG. Two experiments have been conducted to test the correctness of NRGDD algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Segmenting nodules of lung tomography image with level set algorithm and neural network by Chong, Soon Yee, Tan, Min Keng, Yeo, Kiam Beng, Mohd Yusof Ibrahim, Hao, Xiaoxi, Teo, Kenneth Tze Kin

    Published 2019
    “…Computer aided diagnosis (CAD) plays an important role in medical field which helps radiologists to detect and localise lung nodule. The aim of this research is to develop an image segmentation algorithm for nodule detection in computed tomography (CT) image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  16. 16

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Development of novel distance relay scheme to prevent false tripping during power swing by Mohamad, Nor Zulaily

    Published 2017
    “…The initial work carried out in this study focuses on developing a new detection scheme that able to detect a fault that occurs during power swing. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  20. 20