Search Results - (( development priority detection algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…More comprehensive study in behaviour coordination will be the major focus to ensure smoother robot navigation and more effective fire detection capability. Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
    Get full text
    Get full text
    Thesis
  3. 3

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Hui, Bian, Chiew, Kang Leng

    Published 2025
    “…Network intrusion detection is an essential component of contemporary cybersecurity strategies, and the development of efficient techniques to accurately identify malicious activities has become a priority. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Depth frame loss concealment for wireless transmission utilising motion detection information by Ranjbari, Mohamadreza

    Published 2014
    “…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…In addition, the platform introduces AI-powered study tools, including automated question generation and flashcards, as well as a built-in smart calendar planner that applies conflict detection and priority-based scheduling algorithms to help students manage study sessions and deadlines effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Improved rate of faults detection can give developers chance to debug the faulty software earlier. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Design and Modelling of an Energy Aware Dynamic Management for Wireless Sensor Node with Dual Harvesters by Abdal-Kadhim., Ali Mohammed

    Published 2020
    “…To reduce the power consumption while not compromising the integrity of the signal transmission, the sensor node is improved with a novel energy-aware Event-Priority-Driven Dissemination (EPDD) algorithm. It is developed to make the sink station able to detect a missing node within the network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making by Al-Hchaimi, Ahmed Abbas Jasim, Sulaiman, Nasri, Mustafa, Mohd Amrallah, Mohtar, Mohd Nazim, Mohd Hassan, Siti Lailatul, Muhsen, Yousif Raad

    Published 2022
    “…Results: (1) CRITIC weighting shows that MPSoC NoC Routing Algorithm (XY and YX) is the highest weight criterion, whereas latency (clock/cycle) is the less weight criterion. (2) The Fermatean-FDOSM-based group ranking shows that the Collision Point Router Detection (CPRD) countermeasure technique is the first-ranked alternative compared to the Secure Model Checkers (SMCs) approach. (3) The DoS A-CTs priority ranks were subjected to a systematic ranking that was confirmed by solid correlation results throughout thirteen criterion weight values. …”
    Get full text
    Get full text
    Article
  12. 12

    Crash Recovery Support For Variable Strength T-Way Test Generation Strategy by Abdullah, Syahrul Afzal Che

    Published 2016
    “…Empirical evidence in the literature indicated that t-way test generation strategy has managed to minimize the test cases significantly whilst maintaining the fault detection capability of the testing process. Much useful progress has been achieved as far as the development of t-way test generation strategy is concerned. …”
    Get full text
    Get full text
    Thesis