Search Results - (( java application customization algorithm ) OR ( gate detection method algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- method algorithm »
- gate detection »
-
1
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…The proposed method of anomalous behaviour detection in this thesis could be further applied for detection of potential crime at various locations.…”
Get full text
Get full text
Thesis -
2
Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment
Published 2017“…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
Get full text
Get full text
Thesis -
3
-
4
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
5
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
6
Best antenna arrangements for partial discharge detection in medium voltage switchgear
Published 2023Conference Paper -
7
Accelerating FPGA-surf feature detection module by memory access reduction
Published 2019“…One of the popular algorithm used is called the Speeded-Up Robust Features (SURF), which realized the scale space pyramid to detect the features. …”
Get full text
Get full text
Get full text
Article -
8
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper -
9
New CFAR algorithm and circuit development for radar receiver
Published 2020“…The last MATLAB test for MSS-CA- vi CFAR with a spiky exponential model shown in Table 4.3 in chapter four shows clearly that MSS-CA-CFAR detects nine targets from ten that means the efficiency of detection of the proposed method is 90%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Some qualitative research methods such as interviews with the officer from the security division and observation at the main entrance gate of campus will also be performed to determine the Standard Operation Procedure (SOP) of access control and management in UMS security division. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
Article -
14
VHDL Modelling of FECG Extraction from the Composite Abdominal ECG using Artificial Intelligence
Published 2009“…The purpose of this paper is to model the developed algorithms on FECG signal extraction using VHDL (very high speed integrated circuit hardware description language) for FPGA (field programmable gate array) implementation from the abdominal ECG signal using neural network approach is to provide efficient and effective ways of separating FECG signal and its nature. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The position of reference currents is used to detect the voltage vectors surrounding the reference voltage vector in every sampling period. …”
Get full text
Get full text
Get full text
Thesis
