Search Results - (( developing source detection algorithm ) OR ( java data selection algorithm ))

Refine Results
  1. 1

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…Then canonical Polyadic decomposition-based attribute reduction is applied to the offload-able task to reduce the data size. Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
    Get full text
    Get full text
    Article
  2. 2

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Thesis
  4. 4

    Develop algorithm for change detection of the salinity from Landsat-8 images by Hasab, Hashim Ali, Ahmad, Anuar, Marghany, Maged, Ziboon, Abdul Razzak

    Published 2016
    “…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method by Al-Mohair, Hani Kaid Saif

    Published 2017
    “…Color is a significant source of information for human skin detection, and some studies have discussed the effect of color space on skin detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Reducing of Inconsistent Data using Fuzzy Multi Attribute Decision Making for Accessing Data from Database by Yusof, Mohd Kamir, Abdul Rahman, Mohd Nordin, Azlan, Atiqah

    Published 2013
    “…Sample data was selected for experiments purposes. The result indicates fuzzy multi attribute decision making is a suitable technique in reducing inconsistent data from database. …”
    Get full text
    Get full text
    Article
  10. 10

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Autonomous Fire Fighting Mobile Platform by Teh, Nam Khoon, Saman, Abu Bakar Sayuti, Sebastian , Patrick

    Published 2012
    “…Development work done to date on the platform has shown its feasibility of being an autonomous unit to monitor a prescribed area, detect for fire and extinguish the flame.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A pothole boundary detection algorithm using image segmentation technique in urban road by Mohd Shah, Hairol Nizam, Alshami, Abdallah M. M., Abdollah, Mohd Fairus, Ab Rashid, Mohd Zamzuri, Arshad, Mohd Ali

    Published 2025
    “…Employing Otsu's method and Canny edge detection, the algorithm seeks to accurately identify and contour the edges of potholes in urban road imagery. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…The data from photodiode is read by LabVIEW software for further develop to obtain useful output data. The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    LTE-based passive radar for ground target detection and tracking by Salah, Asem Ahmad Mohamad

    Published 2015
    “…This demonstrates the efficiency of the designed system and the proposed algorithm. The current study exhibits the feasibility of LTE signal as passive radar illumination source from both theoretic and practical aspects. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    MelScan: An Android Application for Early Detection of Melanoma by Nyambang, Edwin

    Published 2014
    “…Due to time constraints, the scope of this study was narrowed to analyzing current image processing technology used in melanoma detection, especially on the Android mobile platform, developing an Android application that can use one of the image processing algorithms for melanoma detection, and to improve accuracy of melanoma detection, in particular during its early stages. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Neural network algorithm-based fall detection modelling by Mohd Yusoff, Ainul Husna, Koh, Cheng Zhi, Ngadimon, Khairulnizam, Md Salleh, Salihatun

    Published 2020
    “…High recognition of developed fall detection model is very significance for the elderly to detect the falls. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Non-velocity based analysis of passive ultrasonic signal for source location detection in composite plates: a pilot study by Z. M., Hafizi, Epaarachchi, J., Che Ku Eddy Nizwan, Che Ku Husin, Lau, K. T.

    Published 2012
    “…A linear source location algorithm utilizing AE signals energy attenuation patterns was developed and tested for the composite specimen. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item