Search Results - (( development terms detection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2017
    “…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2017
    “…A portable system based on the developed algorithm has the potential for increased percentage of real-time FHR detection thus enabling successful long-term fetal monitoring.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Final output of the algorithm summarise the bleeding detection for all patient in an excel file. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Detection and extraction features for signatures images via different techniques by Fatma Susilawati, M., Alsuhimat, F.M., Iqtait, M.

    Published 2019
    “…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Three types of March algorithms which are March 17N, March 12N and MarchPS 23N are selected to validate the tool in term of their compatibility for NPSF detection and diagnosis.Suitable data background is identified and a test procedure is developed for each algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Smart object detection using deep learning algorithm and jetson nano for blind people by Tan, Mei Yan, Anis Farihan, Mat Raffei, Mohd Arfian, Ismail

    Published 2021
    “…Therefore, this project develops a smart object detection using deep learning algorithm and jetson nano to improve object detection for blind people. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals by Ahmed, Ahmed Elsayed Elmahdy

    Published 2014
    “…This project aims at developing an automated epileptic seizure event detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…Results from this study indicates the usage of k-NN is proven to be most effective algorithm in terms of performance and accuracy required by the shipping industry fraud detection.…”
    text::Thesis
  20. 20

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article