Search Results - (( java application optimisation algorithm ) OR ( software aggregation detection algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- aggregation detection »
- software aggregation »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Detection of eye movements based on EEG signals and the SAX algorithm
Published 2018Get full text
Get full text
Conference or Workshop Item -
3
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
Published 2023“…The purpose of this research project is to evaluate currently available crack detection systems and to develop an automated crack detection system using Aggregate Channel Features (ACF) that can be used with unmanned aerial vehicles (UAV). …”
Get full text
Get full text
Get full text
Article -
4
-
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
6
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018Get full text
Get full text
Article -
7
-
8
Distributed Denial-of-Service Defense System
Published 2006“…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
Get full text
Get full text
Final Year Project -
9
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…The proposed clustering algorithm is programmed and tested on synthetic and four real-world datasets using the R software. …”
Get full text
Get full text
Article -
10
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…The data stored in the cloud can be retrieved and processed using ThingSpeak software as this software allow user to aggregate, visualize, and analyze live data streams in the cloud. …”
Get full text
Get full text
Monograph -
11
Risk-ranking matrix for security patching of exploitable vulnerabilities
Published 2024“…Unlike few existing research works, our proposed risk ranking matrix for most exploitable vulnerabilities aggregated all the relevant attributes for base CVSS scoring and the CVSS score itself, the proposed algorithm has ten risk levels which are highly granular and flexible. …”
Conference Paper
