Search Results - (( developing site detection algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- java implication »
- implication tree »
- developing site »
- site detection »
- tree algorithm »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
Get full text
Get full text
Thesis -
2
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD simulation model has been developed to test the algorithm on NRG. Two experiments have been conducted to test the correctness of NRGDD algorithm. …”
Get full text
Get full text
Thesis -
3
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
4
Web application vulnerabilities detection model
Published 2016“…This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
Get full text
Get full text
Research Reports -
5
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
Get full text
Get full text
Get full text
Article -
6
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The locations of landslides were detected accurately by employing two Machine learning classifiers, namely, SVM and RF, decision rule and hierarchal rules sets were developed by applying decision tree (DT) algorithm to provide improved landslide inventory. …”
Get full text
Get full text
Get full text
Thesis -
7
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017Get full text
Get full text
Final Year Project -
8
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…There are multiple techniques in training the network, one of which is training with metaheuristic algorithms. Metaheuristic algorithms that aim to develop more effective hybrid algorithms by combining the good and successful aspects of more than one algorithm are algorithms inspired by nature. …”
Get full text
Get full text
Get full text
Article -
9
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
10
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…(SESB) to reduce their distribution loss, estimated around 15% at present in Sabah State, Malaysia. The hybrid algorithm is able to preselect customers to be inspected on-site for abnormalities or potential fraud according to their consumption patterns. …”
Conference Paper -
11
Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin
Published 2023“…Advanced data analytics and machine learning algorithms process this data, enabling the system to detect potential safety hazards, monitor construction progress, and predict resource requirements. …”
Get full text
Get full text
Conference or Workshop Item -
12
Autonomous Fire Fighting Mobile Platform
Published 2012“…This paper describes the development of an Autonomous Fire Fighting Mobile Platform (AFFMP) that is equipped with the basic fighting equipment that can patrol through the hazardous site via a guiding track with the aim of early detection for fire. …”
Get full text
Get full text
Conference or Workshop Item -
13
Covid-19 Fake News Detection Model On Social Media Data Using Machine Learning Techniques
Published 2023Get full text
Get full text
Undergraduates Project Papers -
14
Real-time personal protective equipment compliance detection using you only look once
Published 2024“…Developing automated systems to detect and identify protective equipment in working sites is not just a technical accomplishment but also a significant step towards improving the workplace, especially in high-risk areas like construction and manufacturing sites. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
16
Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection
Published 2022“…By collecting data from news sites, this system is aimed to provide data for predictive modelling so it can be used to detect patterns in supply risks to create and predict the probability of a temporary event occurring in the future…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
-
18
COVID-19 fake news detection model on social media data using machine learning techniques
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article -
20
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
Get full text
Get full text
Get full text
Thesis
