Search Results - (( development process function algorithm ) OR ( java feature detection algorithm ))
Search alternatives:
- function algorithm »
- feature detection »
- process function »
- java »
-
1
Smart student timetable planner
Published 2025“…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Challenges of hidden data in the unused area two within executable files
Published 2009“…Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process. …”
Get full text
Get full text
Get full text
Article -
3
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
6
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
Effort Estimation Model for Function Point Measurement
Published 2007“…Various cost estimation models and methods are available to be used for software development process. The COCOMO, an algorithmic model is one example. …”
Get full text
Get full text
Thesis -
9
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…CAPP functions as the recognizer of the geometric input from CAD and analyse it into specific function for manufacturing purpose in CAM. …”
Get full text
Get full text
Thesis -
10
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
Get full text
Get full text
Thesis -
11
Computer control of batch process plant (software development)
Published 1995“…The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
Get full text
Get full text
Student Project -
12
A block cipher based on genetic algorithm
Published 2016“…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
Get full text
Get full text
Get full text
Thesis -
13
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid artificial immune system-genetic algorithm optimization based on mathematical test functions
Published 2023“…The hybrid includes two processes; firstly, AIS is the attraction among the researchers as the algorithm. …”
Conference paper -
15
-
16
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…A series of algorithms in solving the inverse problem were then developed corresponding to the forward models. …”
Get full text
Get full text
Thesis -
17
A refined differential evolution algorithm for improving the performance of optimization process
Published 2011“…Among the latest Evaluation Algorithm (EA) have been developed is Differential Evolution (DE). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…The developed method also demonstrated the effectiveness of the multi-criteria decision-making process when compared with the multi-objective evolutionary algorithm (MOEA). …”
Get full text
Get full text
Article -
19
A video-rate color image segmentation using adaptive and statistical membership function
Published 2010“…Typically, the image segmentation algorithms in video processing system require very high computation power, so it is desirable to develop algorithms for implementation as a real-time system. …”
Get full text
Get full text
Get full text
Article -
20
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
Get full text
Get full text
Thesis
