Search Results - (( java application using algorithm ) OR ( risk detection method algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4
  5. 5

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  6. 6

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  7. 7

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Slope inspection system using image processed by machine learning algorithm to determine risk of slope failure by Mat Shukor, S. H., Abdul Hamid, Syamsul Bahrin, Kasim, N., Ab. Moin, Z.

    Published 2020
    “…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2007
    “…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Slope inspection system: using image processed by machine learning algorithm to determine risk of slope failure by Mat Shukor, Sabril Haziq, Syamsul Bahrin, Abdul Hamid, Kasim, Norhidayu, Ab. Moin, Zuraidah

    Published 2020
    “…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20