Search Results - (( java implementation during algorithm ) OR ( pattern deviation selection algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- deviation selection »
- selection algorithm »
- pattern deviation »
- during algorithm »
-
1
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
2
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Geomorphometric analysis of landform pattern using topographic position and ASTER GDEM
Published 2017“…Maximum Elevation Deviation was selected to measure the spatial landscape pattern at the maximum (3000) scale of the absolute DEV value within the scale (DEVmax), and finally, high-pass filter algorithm was used to identify the extreme topography (ridges/valleys). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
6
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
7
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…Meanwhile, for improving the efciency of training and predicting, Pearson Correlation analysis, standard deviation, and a new adaptive K-means are used to select attributes and make fuzzy interval decisions. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
9
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…Improvements in the voltage profile, power loss and voltage deviation reduction have been achived.…”
Get full text
Get full text
Thesis -
10
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article -
11
-
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
16
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…Machine learning is able to learn complex relationships within large datasets then identify anomalies that deviate from well-defined patterns. This enables machine learning model to detect those suspicious activities more accurately than traditional approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
