Search Results - (( java implementation during algorithm ) OR ( basic integration detection algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3
  4. 4

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Proposed fatigue index for the objective detection of muscle fatigue using surface electromyography and a double-step binary classifier by Qassim, Hassan M., Hasan, Wan Zuha Wan, Ramli, Hafiz R., Harith, Hazreen Haizi, Inche Mat, Liyana Najwa, Ismail, Luthffi Idzhar

    Published 2022
    “…This paper presents an algorithm that employs a new fatigue index for the objective detection of muscle fatigue using a double-step binary classifier. …”
    Get full text
    Get full text
    Article
  7. 7

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The application can help the administrator to preserve the integrity of a website by automatically detecting any unauthorized contents changes.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Mobile Robot with Navigation Control and Communication by Mohammad Yatim, Amirah Izzati

    Published 2016
    “…Besides, the robot will also need to detect obstacles and avoid it along its movement from one point to another autonomously. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Oil Palm Yield Data Collection Using Image Processing by Yee, Rachel Jee San

    Published 2021
    “…The tools used in training the ANN is the TensorFlow Object Detection API. There are many algorithms in the Object Detection API and three common methods, Faster R-CNN, SSD and YOLO are reviewed for their suitability in object detection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Early detection of spots high water saturation for landslide prediction using thermal imaging analysis by Ghazali, K. H., Mohd Falfazli, Mat Jusof, Muhammad, Badaruddin, Jadin, Mohd Shawal

    “…Hence, to solve this issue, this study investigates a new method to detect water saturation spots which is integrated with a thermal image camera to provide early detection of landslide. …”
    Get full text
    Get full text
    Research Report
  17. 17

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  18. 18

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…These low-level descriptions are then integrated using a basic set of rule-packages, to discriminate the different events. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Motion detection and simulation study on human walking behavior by Loon, Cheong Wai

    Published 2012
    “…The simulation is developed using DarkBasic Professional with the additional extension of Dark AI. …”
    Get full text
    Get full text
    Get full text
    Thesis