Search Results - (( java implementation from algorithm ) OR ( parameter pattern detection algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…Next, the insignificant peak is removed by introducing an argument of minimum peak prominence and maximum peak width where the value of the parameters needs to be determined. As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
    Get full text
    Get full text
    Article
  10. 10

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom

    Published 2022
    “…Next, the insignificant peak is removed by introducing an argument of minimum peak prominence and maximum peak width where the value of the parameters needs to be determined. As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan by Adenan, Muhammad Nasrul Hakim

    Published 2013
    “…The ANN model performance can be optimized by altering certain parameters in the learning algorithm. The results show that the model is able to predict with 97% accuracy and has strong and precise estimation ability with R-factor of 91.55%.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli by Hakim Adenan, Muhammad Nasrul, Zolkapli, Maizatul

    Published 2013
    “…The ANN model performance can be optimized by altering certain parameters in the learning algorithm. The results show that the model is able to predict with 97% accuracy and has strong and precise estimation ability with R-factor of 91.55%.…”
    Get full text
    Get full text
    Article
  14. 14

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Logo recognition using Artificial Neural Network (ANN) / Nor Hamidah Abdul Ghafar by Abdul Ghafar, Nor Hamidah

    Published 2005
    “…Finally, this research found that Artificial Neural Network and back propagation algorithm is suitable for image and pattern recognition.…”
    Get full text
    Get full text
    Student Project
  17. 17

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…In this paper, a â��butterflyâ�� shape derived from the manipulation of the standard PV and OP data, which is more robust towards different loop dynamics, is developed for stiction detection. This simple model-free butterfly shape-based detection (BSD) method uses Stenman's one parameter stiction model, which results in a distinctive â��butterflyâ�� pattern in the presence of stiction. …”
    Get full text
    Get full text
    Article