Search Results - (( java detection model algorithm ) OR ( program implementation drops algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Comparisons are done between systems implementing authentication and those that do not. The results show that the average delay is not much affected by the implementation of the program. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The model involves motorize movement, sensors detection and machine vision to be manipulated by the programmers inside their programs. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis