Search Results - (( developing step function algorithm ) OR ( java model detection algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…These steps are repeat until a condition satisfied. The system uses the Rapid Application Development (RAD) methodology in system development and will be operate on a web-based platform. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…The numerical results showed that the developed methods are better in terms of number of total steps,failure steps and function when compared with the existing methods in most problems tested. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…Also, a one-step iterative algorithm, called expected rank algorithm, is introduced which is more complicated than the estimation-approximation algorithm, but more accurate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…The numerical solution of RDDE is then extended for solving the neutral delay differential equations (NDDE) of non-discontinuity and discontinuity cases. A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Digital assistant for workspace apps by See, Ling Xuan

    Published 2022
    “…The problem is that way too many functions to be configured or used in the Microsoft Teams consider time waste to achieve a task with many steps. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Improving utility accrual scheduling algorithm for adaptive real-time system by Ahmad, Idawaty, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Othman, Muhammad Fauzan

    Published 2008
    “…The proposed algorithm focused on an independent task model, which works on deadline constraints that are specified by using step time/utility functions (or TUFs). …”
    Get full text
    Get full text
    Conference or Workshop Item