Search Results - (( developing terms detection algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- developing terms »
- java application »
- terms detection »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus
Published 2018“…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
Get full text
Get full text
Get full text
Article -
6
Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus
Published 2017“…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus
Published 2018“…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
Get full text
Get full text
Get full text
Article -
8
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
9
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
10
Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus
Published 2017“…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Final output of the algorithm summarise the bleeding detection for all patient in an excel file. …”
Get full text
Get full text
Thesis -
12
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
13
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
14
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Three types of March algorithms which are March 17N, March 12N and MarchPS 23N are selected to validate the tool in term of their compatibility for NPSF detection and diagnosis.Suitable data background is identified and a test procedure is developed for each algorithm. …”
Get full text
Get full text
Thesis -
15
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
16
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021“…Therefore, this project develops a smart object detection using deep learning algorithm and jetson nano to improve object detection for blind people. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
