Search Results - (( development technical detection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- development technical »
- technical detection »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
3
-
4
-
5
-
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
8
-
9
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…There are multiple techniques in training the network, one of which is training with metaheuristic algorithms. Metaheuristic algorithms that aim to develop more effective hybrid algorithms by combining the good and successful aspects of more than one algorithm are algorithms inspired by nature. …”
Get full text
Get full text
Get full text
Article -
10
A preliminary lightweight random forest approach-based image classification for plant disease detection
Published 2022“…According to the demand of developing precision agriculture, this study plans to carry out comprehensive improvise research on the intelligent unmanned plant disease detection technology for agricultural ecosystems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
-
15
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
16
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
17
Shape-Based Matching: Application of Defect Detection
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Sensor module for urban vehicle two way connection monitoring system/ Muhammad Ilyasaa Abdul Rahman
Published 2015“…The project framework is divided into 2 main parts: living thing and impact detection. The sensing module will be interfaced with a microcontroller platform programmed with a set of algorithm. …”
Get full text
Get full text
Student Project -
19
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
20
Analysis of detection system for cover tape offset in the tap and reel process using neural net time series method
Published 2025“…The research aims to develop an efficient system utilizing the Raspberry Pi Camera Module for detecting and analyzing cover tape misalignment. …”
Get full text
Get full text
Get full text
Get full text
Article
