Search Results - (( development projects normalization algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION by LAW, JIN MING

    Published 2022
    “…The developed algorithm is trained on the augmented Chinese Power Line Insulator Dataset (CPLID) that consisted of normal and missing cap insulator images. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Algorithm for calculation of cephalometric soft tissue facial traits by Azam Rana, Mohammad, Setan, Halim, Majid, Zulkepli, Chong, Albert K.

    Published 2007
    “…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…This project suggesting a modified DTW algorithm with the proposed Missed Nodes Recovery Algorithm aims to improve the mapping performance, hence the development of stroke to stroke signature comparison is possible. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modelling of multi-robot system for search and rescue by Poy, Yi Ler

    Published 2023
    “…In this project, this sensor-based algorithm is known as the Obstacle Avoidance Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14
  15. 15

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Application of Evolutionary Algorithm for Assisted History Matching by Zahari, Muhammad Izzat

    Published 2014
    “…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Iris Recognition As Biometric Authentication by Kamaruddin, Muhammad Khairulsyamim

    Published 2016
    “…In this project, the proposed iris recognition technique will be based on the John Daugman’s algorithm. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Development of Technical Safety Dashboard Using Microsoft Power BI Integration with R by Mohd Shamim, Nur Farisha Shuhada

    Published 2020
    “…As to perform these studies, literature review has been executed together with the prototype development. In this paper, all researches and results of this project development completely documented.…”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Application Of Neural Network In Malaria Parasites Classification by Lim, Chia Li

    Published 2006
    “…The first stage of this project is to develop the neural network using MATLAB Neural Network Toolbox and Borland C++ Builder. …”
    Get full text
    Get full text
    Monograph