Search Results - (( developments event extraction algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Fatigue Features Extraction of Road Load Time Data Using the S-Transform by S., Abdullah, Che Ku Eddy Nizwan, Che Ku Husin, M. F. M., Yunoh, M. Z., Nuawi, Z. M., Nopiah

    Published 2013
    “…The algorithm can be used to extract the fatigue damaging events and these events were combined in order to produce a new edited signal which neglect the low amplitude cycles. …”
    Get full text
    Get full text
    Article
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    “Analysis of EEG Recordings During Grasp and Lift (GAL) Trials by Musa, Huwaida

    Published 2018
    “…There are two types of investigation which are classification with feature extraction and without feature extraction. Throughout this project, we managed to get the classification accuracy of 6 events for 26.6% and 58.5% while for 2 events of up to 67.4% and 96% using 6 channels for both algorithms respectively.…”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection by Ng, Shi Ya

    Published 2022
    “…The significance of the extracted output is evaluated with the topic modelling algorithm (LDA model algorithm) for the purpose of predictive supply risk. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…At first, a peak classification algorithm is developed based on the general following processes including peak candidate identification, feature extraction, and classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E by Oad, Aneel

    Published 2013
    “…In this research, two algorithms tailored at enhancing the performance of hybrid algorithms in the WiMAX domains have been designed and developed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
    Get full text
    Get full text
    Article
  15. 15

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17
  18. 18
  19. 19

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Conventional and intelligent models for detection and prediction of fluid loss events during drilling operations: A comprehensive review by Krishna, S., Ridha, S., Vasant, P., Ilyas, S.U., Sophian, A.

    Published 2020
    “…Several theoretical studies have been performed to detect and predict fluid loss event during hydrocarbon extraction. This paper reviews the existing conventional and intelligent models developed for early detection and prediction of lost circulation events. …”
    Get full text
    Get full text
    Article