Search Results - (( java feature detection algorithm ) OR ( program visualisation using algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi by Muniyandi, Chandren, Maroosi, Ali

    Published 2015
    “…Algorithm visualisation (AV) can be utilised to improve students ’programming and programme comprehension skills. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    The efficacy of personal computer (PC) AI image enhancer software on low and high contrast PA chest radiograph: an experimental study by Baharudin, Nurul Atiqah, Ahmad Zaiki, Farah Wahida

    Published 2026
    “…Methods: An experimental investigation was undertaken using five PC AI image enhancer programs to visualise the thoracic anatomy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code by Mohd Yunos, Mohd Amirul Syafiq, Anak Usang, Mark Dennis, Ithnin, Hanafi, Hussain, Siti Aslina, Mohamed Yusoff, Hamdan, Sipaun, Susan

    Published 2018
    “…The iterative reconstruction algorithms is used to generate and calculate the 2600 coordinates of calibration map from the number of photon counts from the ten NaI scintillation detectors. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…This application, integrated with a predictive model, offers real-time visualisation of primary cooling system characteristics through handheld devices. …”
    Get full text
    Get full text
    Thesis
  11. 11

    FBGA-based implementation of electronic abacus using altera DE2 board by Sidek, Azmi

    Published 2017
    “…The development of electronic abacus is to integrate the use of abacus along with electronic devices which offers better visualisation of the abacus operations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Modified dynamic programming model with limited order picking capacity / Noraimi Azlin Mohd Nordin by Noraimi Azlin , Mohd Nordin

    Published 2021
    “…Next, to determine either Dijsktra’s algorithm or Dynamic Programming Method will give the most accurate shortest path and minimum travel time for order pickers. …”
    Get full text
    Get full text
    Get full text
    Thesis