Search Results - (( java application customization algorithm ) OR ( construct validity detection algorithm ))
Search alternatives:
- customization algorithm »
- construct validity »
- validity detection »
- java application »
-
1
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Automatic Road Network Recognition and Extraction for Urban Planning
Published 2009“…A Hybrid Simple Colour Space Segmentation & Edge Detection (Hybrid SCSS-EDGE) algorithm was developed to extract roads automatically from satellite-taken images. …”
Get full text
Get full text
Get full text
Article -
5
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis -
6
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Article -
7
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. The framework was subsequently verified and validated through expert reviews and experimental testing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…In this research we present a new approach of constructing fingerprint database. We propose a hybrid calibration procedure that combines signal sampling process with path-loss prediction algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
10
MalDroid: Secure DL-enabled intelligent malware detection framework
Published 2021“…Moreover, the performance of the proposed algorithm has been verified both with the constructed hybrid DL-driven algorithms and current benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
Get full text
Get full text
Thesis -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
13
Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection
Published 2019“…The palm vascular detection processing was also executed on the self-developed dataset constructed earlier for validation. …”
Get full text
Get full text
Thesis -
14
ReSTiNet: An efficient deep learning approach to improve human detection accuracy
Published 2023“…Human detection is an important task in computer vision. …”
Get full text
Get full text
Get full text
Article -
15
ReSTiNet: An Efficient Deep Learning Approach to Improve Human Detection Accuracy
Published 2023“…On Tesla k80, mAP is 27.3 for MS COCO and 63.74 for PASCAL VOC. The validation of the proposed ReSTiNet model has been done on INRIA person dataset using the Tesla K80. â�¢ All the necessary steps, algorithms, and mathematical formulas for building the net- work are provided. â�¢ The network is small in size but has a faster detection speed with high accuracy. …”
Get full text
Get full text
Article -
16
Design and development of latex mark visual detection system
Published 2025Get full text
Get full text
Get full text
Article -
17
Stereo Camera-Based Aerial Target Geolocation in a Ground-Based Platform Environment
Published 2024thesis::master thesis -
18
ReSTiNet : An efficient deep learning approach to improve human detection accuracy
Published 2023“…On Tesla k80, mAP is 27.3% for MS COCO and 63.74% for PASCAL VOC. The validation of the proposed ReSTiNet model has been done on INRIA person dataset using the Tesla K80. • All the necessary steps, algorithms, and mathematical formulas for building the net- work are provided. • The network is small in size but has a faster detection speed with high accuracy.…”
Get full text
Get full text
Get full text
Article -
19
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…First, the vibration signals of gear with different fault conditions were decomposed by a fourth-level discrete wavelet packet transform, and the statistical features at all constructed nodes were derived. Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
20
Load shedding scheme for islanded distribution network with flexible load selection and power changes / Ja’far Saifeddin Abdelhafiz Jallad
Published 2018“…Taking into account the time execution, the artificial neural network (ANN) model was constructed based on the daily load plots. The second aspect involve monitoring the overshooting signal of the second frequency derivative of the center of inertia so that we can detect new power deficits during the load shedding process. …”
Get full text
Get full text
Get full text
Thesis
