Search Results - (( developing using lean algorithm ) OR ( java data detection algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Development of a systematic method in lean tool selection for automotive industry by Anvari, Alireza

    Published 2012
    “…The developed software probably assists manufacturers in applying the systematic lean tool selection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Developing Android Application To Guide Lean Six Sigma PDCA Project by Ong, Sin Joo

    Published 2018
    “…This often leads to confusions and misuse of lean tools. Mobile application grows rapidly with abundant of application development. …”
    Get full text
    Get full text
    Monograph
  5. 5

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Developing a hybrid model for accurate short-term water demand prediction under extreme weather conditions: a case study in Melbourne, Australia by Zubaidi S.L., Kumar P., Al-Bugharbee H., Ahmed A.N., Ridha H.M., Mo K.H., El-Shafie A.

    Published 2024
    “…Hybrid model development included the optimization of ANN coefficients (its weights and biases) using adaptive guided differential evolution algorithm. …”
    Article
  11. 11

    Parametric Study Of Instantaneous Heat Transfer Based on Multidimensional Model in Direct-Injection Hydrogen-Fueled Engine by Hamada, Khalaf I., M. M., Rahman, A. Rashid, A. Aziz

    Published 2013
    “…The modified wall-function was used for resolving the near-wall transport. An arbitrary Lagrangian–Eulerian algorithm was adopted for solving the governing equations. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Comparison Between Levenberg-Marquardt (LM) Intelligent System And Bayesian Regularization (BR) Intelligent System For Flow Regime Classification by Sa'ad, Mohamad Iqbal

    Published 2006
    “…Multilayed Perceptron (MLP), a type of artificial neural network (ANN) which is widely used in a classification problem is developed using MATLAB 7®. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Flame Development Study at Variable Swirl Level Flows in a Stratified CNG DI Combustion Engine using Image Processing Technique by Anbese, Yohannes T., A.R.A., Aziz, Abdul Karim, Z. A.

    Published 2011
    “…This study aims to investigate the characteristics of flame development in a lean-stratified combustion of CNG in a single cylinder Direct Injection (DI) engine at a specific motor speed and fixed injection timing and air-fuel ratio by varying only the swirl level at the intake. …”
    Get full text
    Get full text
    Citation Index Journal
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A study of the heat transfer in hydrogen fueled internal combustion engine by Khalaf Ibrahim, Hamada

    Published 2012
    “…The reliability of the newly developed correlation was verified using the Taylor's correlation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method by Delgoshaei, Aidin

    Published 2016
    “…Then, design of experiments is used to examine the sensitivity of the parameters of each solving algorithm using Taguchi method. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise