Search Results - (( event detection process algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection by Ng, Shi Ya

    Published 2022
    “…For these purposes, a web scraping program is developed to identify the supply risks caused by these temporary events. It is a low-cost solution for the temporary events to be evaluated so that the risks can be detected in real-time for better decision-making. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    Test Data Generation for Event Driven System Using Bees Algorithm by Mohammed Zabil, Mohd H., Kamal Z., Zamli

    Published 2013
    “…For an event driven system, the order of the event sequence should also be tested to detect failure in any possible sequences of the event. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model by Afsoon Badiei, Saeed Meshgini, Ali Farzamnia

    Published 2020
    “…Detecting the change in sleep stages is a complex process and requires the expertise of a neurologist. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The Support Vector Machine (SVM) classifier is trained to detect transitions. Specifically, the HTs are detected by the trained SVM model and then refined to eliminate the false-alarm events. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Partitioning detection and connectivity restoration algorithm for WSAN by Muhammad, Imran, Md Said, Abas, Hasbullah, Halabi, Younis, Mohammed

    Published 2010
    “…A backup actor detects the failure and initiates a recovery process that may involve coordinated multi-actor relocation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…A backup actor detects the failure and initiates a recovery process that may involve coordinated multi-actor relocation. …”
    Get full text
    Get full text
    Article
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  11. 11

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…The purpose of this study is to see the accuracy of the algorithms and compare it. The highest algorithm will be chosen as the best model and algorithm that can be used to detect cyberbullying tweet text.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…The third contribution aims to provide an integrated solution to detect multiple events in different regions-of-interest of a given scene. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Event Detection and Information Extraction Strategies from Text: A Preliminary Study Using GENIA Corpus by Abdullah, M.H.A., Aziz, N., Abdulkadir, S.J., Akhir, E.A.P., Talpur, N.

    Published 2023
    “…Similarly, for event detection, the DeepEventMine model has scored highest among other models with a precision of 65.24, recall at 55.93, and F-1 measure at 60.23 based on the selected corpus. …”
    Get full text
    Get full text
    Article
  16. 16

    Event Detection and Information Extraction Strategies from Text: A Preliminary Study Using GENIA Corpus by Abdullah, M.H.A., Aziz, N., Abdulkadir, S.J., Akhir, E.A.P., Talpur, N.

    Published 2023
    “…Similarly, for event detection, the DeepEventMine model has scored highest among other models with a precision of 65.24, recall at 55.93, and F-1 measure at 60.23 based on the selected corpus. …”
    Get full text
    Get full text
    Article
  17. 17

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Red tide detection using remotely sensed data: A case study of Sabah, Malaysia by Asmala Ahmad, Noorazuan Hashim, Laili Nordin

    Published 2009
    “…This article examines the use of the RT image-processing algorithm through SPOT 4 satellite data application in detecting toxic blooms which occurred on February 2000. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A novel islanding detection technique using modified Slantlet transform in multi-distributed generation by Hizam, Hashim, Ahmadipour, Masoud, Mohd Radzi, Mohd Amran, Othman, Mohammad Lutfi, Chireh, Nikta

    Published 2019
    “…Slantlet transform is utilized to derive the features in the required detection parameters measured from islanding and non-islanding events using identified Slantlet scales. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Advance video analysis system and its applications by Ali, Md. Hazrat, Shafie, Amir Akramin, Hafiz, Fadhlan, Mat Ali, Roslizar

    Published 2010
    “…Among the main features of this research some are, Event Id, Video Id, and Human Id which give detail information about the events, videos and other tracked objects. …”
    Get full text
    Get full text
    Get full text
    Article