Search Results - (( java application modified algorithm ) OR ( sequence classification matching algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Block Motion Estimation Using Directional Adaptive Search Window by Fadly Chew, Nor Farhana, Badruddin, Nasreen

    Published 2006
    “…The proposed algorithm determines the amount of motion in past frames and classifies the video sequence as having low, medium or high motion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Improved GART neural network model for pattern classification and rule extraction with application to power systems by Yap K.S., Lim C.P., Au M.T.

    Published 2023
    “…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
    Article
  3. 3
  4. 4

    Block motion estimation using directional adaptive search window by Chew , N.F.F., Badruddin ., Nasreen

    Published 2007
    “…The proposed algorithm determines the amount of motion in past frames and classifies the video sequence as having low, medium or high motion. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Detection of Workers’ Behaviour in the Manufacturing Plant using Deep Learning by Goh, Ching Pang

    Published 2023
    “…Utilizing machine learning algorithms, our system learns and detects intricate activities from worker behavior sequences, offering a sophisticated analysis of worker efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13