Search Results - (( development programme normalization algorithm ) OR ( java future detection algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…Identification microcaicifications images application was developed to improve detection of microcaicifications efficiency in image quality and high detection efficiency in early detection environments. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…To facilitate the complete pullback process of this group, a point locater algorithm is developed. In this work, we present three different pullback algorithms for the surfaces we considered and carefully integrate them into our Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm by Obaid, Zeyad Assi, Sulaiman, Nasri, Hamidon, Mohd Nizar

    Published 2009
    “…This paper proposes developed method to design a digital fuzzy logic controller with the aid of conventional Proportional – integral – derivative (PID) controller using field programmable gate array (FPGA). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Several statistical tests such as normality test and reliability analysis were conducted. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic Classification of Cervix Type by Muktiar Singh, Jasdeep Singh

    Published 2019
    “…In a developed country like United States, cervical cancer rate has been improved by 70% in the last 40 years due to a good screening programmes implemented in their country. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    A customized floating-point processor design for FPGA and ASIC based thermal compensation in high-precision sensing by Sajjad, M., Yusoff, M.Z., Ahmed, M.

    Published 2021
    “…The signal processing techniques in the sensors are normally implemented using Field Programmable Gate Arrays (FPGAs) or Application-Specific Integrated Circuits (ASICs). …”
    Get full text
    Get full text
    Article
  9. 9

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Nonlinear three-dimensional finite elements for composite concrete beams by Kohnehpooshi, Omid

    Published 2012
    “…Therefore in this study, new interface elements have been developed,while modified constitutive law have been applied and new computational algorithm is utilised. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…In conclusion, diabetic ketoacidosis in unrestricted food intake conditions can be predicted using the proposed ANFIS and GA-ANFIS model. Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Preliminary study on fault detection using artificial neural network for water-cooled reactors by Abdul Karim, Julia, Lanyau, Tony, Maskin, Masleha, Anuar, M. A. S., Che Soh, Azura, Abdul Rahman, Ribhan Zafira

    Published 2020
    “…This work was carried out to discover the use of an artificial neural network (ANN) to model and develop a fault detection programme in the RTP cooling system. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article