Search Results - (( developing supplied detection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- supplied detection »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection
Published 2022“…The significance of the extracted output is evaluated with the topic modelling algorithm (LDA model algorithm) for the purpose of predictive supply risk. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
Get full text
Get full text
Get full text
Article -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
7
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…There were also identification of factors that influence fraud activity, review existing fraud detection models, develop the detection model and implement it using a well-known tool in the market namely Rapidminer. …”
text::Thesis -
8
Development of machine learning-based algorithm to determine the condition in transformer oil
Published 2021“…Machine Learning (ML) algorithm have been utilized to detect the fault more accurate. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Optimizing high-density aquaculture rotifer Detection using deep learning algorithm
Published 2022“…In this paper, we present the method and performance to detect rotifer Brachionus plicatilis in 1ml sample automatically using deep learning algorithm YOLOv3. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
11
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Cornsense: leaf disease detection application / Iffah Fatinah Mohamad Nasir
Published 2025“…The purpose of this project is to develop a mobile application for corn leaf disease detection leveraging the YOLOv8 (You Only Look Once version 8) object detection algorithm. …”
Get full text
Get full text
Thesis -
14
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
16
An effective islanding detection method for photovoltaic grid connected inverter / Ku Nurul Edhura Ku Ahamad
Published 2013“…An analog circuit for over/under voltage protection is developed to ensure fast detection and no delay to system. …”
Get full text
Get full text
Thesis -
17
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…Therefore, this study aims to develop a new health monitoring system for communication towers based on AdaBoost, Bagging, and RUSBoost algorithms as hybrid algorithm, which can predict the damage by using noisy, random, unstable, and skewed frequency data with high accuracy. …”
Get full text
Get full text
Thesis -
18
Cross phase polarization algorithm for fault direction determination using zero crossing method to determine phase difference
Published 2023Conference paper -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
