Search Results - (( development managers detection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- development managers »
- managers detection »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Early detection for server availability in University Malaya data center / Mohd Azizi Osman
Published 2016“…The objective of the system is to design the detection algorithm for server availability, to develop the detection algorithm for server availability and to test the detection algorithm form server availability. …”
Get full text
Get full text
Thesis -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Testing static single cell faults using static and dynamic data background
Published 2011Get full text
Get full text
Conference or Workshop Item -
7
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
8
-
9
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…Employing Otsu's method and Canny edge detection, the algorithm seeks to accurately identify and contour the edges of potholes in urban road imagery. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis -
11
COMPUTERIZED SEGMENTATION OF SINUS IMAGES
Published 2009“…Multilevel thresholding algorithms were developed to segment the images into meaningful regions for the detection of sinusitis. …”
Get full text
Get full text
Final Year Project -
12
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…Identification microcaicifications images application was developed to improve detection of microcaicifications efficiency in image quality and high detection efficiency in early detection environments. …”
Get full text
Get full text
Thesis -
16
Enhanced android malware detection framework using API application framework layer
Published 2023“…This thesis was to develop an enhanced framework to detect Android malware application using Application Framework layer components. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
An estimation algorithm for improved maritime obstacle detection
Published 2024“…This paper presents an advanced estimation algorithm for improving obstacle detection in maritime navigation by integrating data from Velodyne LiDAR HDL-32E and a ZED2I depth camera on the Riptide Unmanned Surface Vehicle. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
Development of land target following system of hexacopter
Published 2015“…A few experiments were conducted to get the performance of the methods focusing on color detection algorithms. The results of the experiments show that different approach angle and lighting of the hexacopter will result in different level of accuracy of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
