Search Results - (( java application optimization algorithm ) OR ( software detection process algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This project entitled “ Edge Detection Algorithm for Image Processing of Search and Rescue Robot ” has its primary purpose to identify an optimum edge detection algorithm for image processing of search and rescue robot. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Software requirement specification (SRS) document is the most crucial document in software development process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-Time Face Detection And Tracking Using Software And Hardware Design by Chen, Kok Keat

    Published 2018
    “…This project presents the design and the implementation of face detection algorithm for video processing applications on FPGAs. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12

    An algorithm to measure unsymmetrical circle shape of intravascular ultrasound image using image processing techniques by Kutty, Suhaili Beeran, O. K. Rahmat, Rahmita Wirza, Kassim, Sazzli Shahlan, Madzin, Hizmawati, Hamdan, Hazlina

    Published 2021
    “…The methodology starts with image acquisition process followed by image segmentation. After that, border detection for each ROI was detected and the algorithm was applied to calculate the corresponding region. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    The capability of [multi-rotor DJI phantom 3] advanced for detecting crack on concrete wall different distance / Ain Uzzairah Amran by Amran, Ain Uzzairah

    Published 2018
    “…The accuracy assessment is used in order to analyze capabilities of multi-rotor DJI Phantom 3 in detecting crack at different distance. The qualitative measures uses edge detection algorithm of Digimizer software to detect crack whereas quantitative uses accuracy assessment with edge detection algorithm to study their relationship. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…In the third stage, implementation process is done by coding the motion detection software using Microsoft Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20