Search Results - (( java application modified algorithm ) OR ( using preventive practice algorithm ))
Search alternatives:
- application modified »
- practice algorithm »
- java application »
- using preventive »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
5
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…Under the background of big data, it is of practical significance to prevent loan risk by the machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Integration of spectroscopy and chemometric analysis for food authentication: a review
Published 2025“…This paper reviews various types of classification and regression algorithms in chemometric analysis to demonstrate the capabilities of these algorithms for use in food authentication processes. …”
Get full text
Get full text
Get full text
Article -
7
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
Get full text
Get full text
Conference or Workshop Item -
8
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
Get full text
Get full text
Thesis -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Development of an effective clustering algorithm for older fallers
Published 2022“…Such a tool could serve as a case identification or clinical decision support tool for clinical practice to enhance access to falls prevention efforts.…”
Get full text
Get full text
Article -
14
-
15
Ethical concerns about the applications of artificial intelligence in healthcare practices: an explanatory review
Published 2021“…It helped medical doctors’ interpretation of medical images that are designed to diagnose given illnesses, such as imaging practices of X-ray, MRI and ultrasound diagnoses. Though the use of artificial intelligence and machine-learning algorithms is rapidly growing in various healthcare practices with promising potentials, however the use of computer-generated applications in healthcare sector have raised certain ethical concerns about the safety and reliability of these applications. …”
Get full text
Get full text
Get full text
Article -
16
Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors
Published 2020“…To make robotic hand devices controlled by surface electromyography (sEMG) signals feasible and practical tools for assisting patients with hand impairments, the problems that prevent these devices from being widely used have to be overcome. …”
Get full text
Get full text
Get full text
Article -
17
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Estimation of boiler's tubes life, Artificial Neural Networks approach / Murtadha F. Muhsen
Published 2011“…Predicting boilers tube life successfully presented using this method will help maintenance engineers to schedule preventive maintenance procedure in order to minimize maintenance cost and to prevent any consequences of disasters which may happen if the necessary precautions were not taken.…”
Get full text
Get full text
Get full text
Article -
20
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
Get full text
Get full text
Thesis
