Search Results - (( java application testing algorithm ) OR ( source detection system algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    LTE-based passive radar for ground target detection and tracking by Salah, Asem Ahmad Mohamad

    Published 2015
    “…The systems capability to detect multi-targets moving on the ground in the same scene was also examined. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Water Pollution Source Identification Based on Real-Time Monitoring System in Siak River by Kadir, E.A., Listia Rosa, S., Othman, M.

    Published 2021
    “…Location of sources pollution identified and the exact location found at the sensor node number 2 and 4 which indicated by abnormal reading data, various kind of material contained into river detected by the sensors system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Therefore, the aim of the study is to identify a fast, simple, and reliable method of FD on GCPV system in Malaysia. The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of vehicle detection and counting system for traffic analysis using computer vision by Saw, Kenny Wei Wen

    Published 2024
    “…In traffic analysis, a real-time vehicle detection and counting system is definitely important, as existing systems only provide the ability to detect or count, but not all of them. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method by Al-Mohair, Hani Kaid Saif

    Published 2017
    “…The performance of the developed system has been compared with the existing intelligent skin detection systems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Advanced fault detection in DC microgrid system using reinforcement learning by Min, Keng Tan, Kar, Leong Lee, Kit, Guan Lim, Ahmad Razani Haron, Pungut Ibrahim, Tze, Kenneth Kin Teo

    Published 2021
    “…The results showed that the improved Negative Selection Algorithm with variable sized detector has better performance than the general Negative Selection Algorithm with constant sized radius in detecting fault in DC microgrid system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  11. 11

    Develop algorithm for change detection of the salinity from Landsat-8 images by Hasab, Hashim Ali, Ahmad, Anuar, Marghany, Maged, Ziboon, Abdul Razzak

    Published 2016
    “…The aims of this study to develop mathematical algorithms for the salinity change detection from Landsat-8 images. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A norms mining approach to norms detection in multi-agent systems by A. Mahmoud, Moamin, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mohd Yusoff , Mohd Zaliman, Mustapha, Aida

    Published 2012
    “…The visitor agent detects the norms from these sources depending on their availability. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm by Harshada Nerkar, Kundu, Prasanta, Chowdhury, Anandita

    Published 2023
    “…In a large power system network with numerous generating sources and transmission lines, it is difficult to determine the availability of inertia in the system. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A behavior based algorithm to detect spam bots by Zamil, Mohammed Fadhil

    Published 2009
    “…Spamming causes illegal consuming of network resources in general and mail system in particular. The objective of this research is to detect the source of spam on the network by detecting the abnormal behaviors that reflect spamming activities. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An algorithm to group defects on printed circuit board for automated visual inspection by Khalid, Noor Khafifah, Ibrahim, Zuwairie, Zainal Abidin, Mohamad Shukri

    Published 2008
    “…However, besides the need to detect the defects, it is also essential to classify these defects so that the source of these defects can be identified. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A hybrid unsupervised approach toward EEG epileptic spikes detection by Khosropanah, Pegah, Ramli, Abdul Rahman, Abbasi, Mohammad Reza, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…Moreover, since epileptic spike detection is a vital component of epilepsy source localization, therefore this algorithm can be utilized for EEG-based pre-surgical evaluation of epilepsy.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…Therefore, there is a need for methods to detect insider threats inside an organization. Log files are great source of information which can help to detect, understand and predict these kinds of threats. …”
    Get full text
    Get full text
    Get full text
    Thesis