Search Results - (( developing utilisation detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…Machine learning is utilised for malware detection with the advancement of malware analysis. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection by Sze Sin, Voon, Kho, Lee Chin, Ngu, Sze Song, Annie, Joseph, Kuryati, Kipli

    Published 2024
    “…The proposed model leverages machine learning algorithms for autonomous detection of insulators. To determine the optimal stopping point and safety distance between the UAV and the insulator, a mathematical model is presented that utilises the captured images and the machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Feasibility study of utilising electronic nose to detect BSR disease in oil palm plantation by Marni Azira, Markom

    Published 2010
    “…As a conclusion, this work confirms that it is feasible to utilise the electronic nose and ANNs to detect and discriminate the BSR disease both in the laboratory and in the plantation.…”
    Get full text
    Thesis
  9. 9
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Development of mesoscopic imaging system for surface inspection / Moe Win by Moe , Win

    Published 2018
    “…The developed system is then utilised for inspection and defect detection of titanium coated surfaces, although appearing uniform, exhibits non-visible micro-cracks which remains hidden from naked eye observations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity by Yau, Jia Xin

    Published 2023
    “…It is expected the fact that the research will result in the development of phishing detection technologies that are more precise and efficient, thereby bolstering online security and protecting users against identity and financial deception. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Enhanced android malware detection framework using API application framework layer by Abdul Ghani, Saidah Mastura

    Published 2023
    “…Besides, Application Framework layer consists of manager blocks which can be used to access data in Android device, making the most vulnerable layer in which the malware developers like to exploit. This thesis was to develop an enhanced framework to detect Android malware application using Application Framework layer components. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Vehicle Tracking using Video Cameras by Johnson, Girberth

    Published 2013
    “…MATLAB is utilised for the algorithm development. In MATLAB, background subtraction is performed as to extract the foreground image from the background image. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…This work presents a novel real-time system for detecting SQLI attacks. The system utilises a machine learning approach to train and enhance its ability to identify and prevent SQLI attacks accurately. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis