Search Results - (( java implementation level algorithm ) OR ( missing process detection algorithm ))

Refine Results
  1. 1

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Detection Of Misplaced And Missing Regions In Image Using Neural Network by Tan , Jin Siang

    Published 2017
    “…Based on research, most of the algorithms are not intelligent enough and only able to detect the missing component. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…This post processing algorithm was provided based on a multi-level scanning and shape analysis which was presented for the better performance of high correct detection and lower false alarms for each given threshold. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Restoration of missing data in old archives based on genetic algorithm by Khammar, Mohammad Reza, Saripan, M. Iqbal, Marhaban, Mohammad Hamiruce, Ishak, Asnor Juraiza, Zolfaghari, Fateme

    Published 2014
    “…After applying most algorithms to detect the position of blotches and also scratch which is another type of defect in the old media, in each frame of video, it is essential to correct them, in other words, we should fill the missing data with reasonable values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Improving the efficiency of clustering algorithm for duplicates detection by Emran, Nurul Akmar, Abdul Rahim, Abdulrazzak Ali Mohamed, Kamal Baharin, Safiza Suhana, Othman, Zahriah, Salem, Awsan Thabet, Abd Aziz, Maslita, Md. Bohari, Nor Mas Aina, Abdullah, Noraswaliza

    Published 2023
    “…Clustering method is a technique used for comparisons reduction between the candidates records in the duplicate detection process. The process of clustering records is affected by the quality of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Process monitoring and fault detection in nonlinear chemical process based on multi-scale Kernel Fisher discriminant analysis by Md Nor, Norazwan, Hussain, Mohd Azlan, Che Hassan, Che Rosmani

    Published 2015
    “…A monitoring statistic based on Hoteling’s T2 statistics is used in process monitoring and fault detection. The Tennessee Eastman benchmark process is used to demonstrate the performance of the proposed approach in comparison with conventional statistical monitoring and fault detection methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…The overall accuracy of counting existing oil palm trees using the approach developed in this study is 93.3% while missing trees detection gives the detection accuracy of 89.2%. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Human face detection using skin color segmentation and watershed algorithm by Fatma Susilawati, Mohamad, Abdulganiyu, Abdu Yusuf, Zahraddeen, Sufyanu

    Published 2017
    “…Finally, lips area is localized as it may be missing during the detection process. Detection rate of up to 97.22% was obtained using standard database. …”
    Get full text
    Get full text
    Article
  13. 13

    Missing point on the corner by using extension cases of advancing front mesh method by Awang, Noorehan, O. K. Rahmat, Rahmita Wirza, Ng, Seng Beng, Jaafar, Azmi, Sulaiman, Puteri Suhaiza, Ilias, Mohd Rijal

    Published 2020
    “…The holes focused was on the missing point on the corner of the object. In the algorithm, object was chosen and two procedure used to achieved the results. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application by Wan Nor Afiqah, Wan Othman

    Published 2016
    “…Hence, „Detecting Indoor Positioning of Moving Object using Wi-Fi Triangulation Algorithm for Kid Tracker Application‟ as a part of process in Kid Tracker Application to keep track our kids movement by focusing inside the building (shopping mall). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  19. 19

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An enhanced robust association rules method for missing values imputation in Arabic language data set by Salem, Awsan Thabet

    Published 2023
    “…This method deals with high missing value rates by adjusting the support threshold in every iteration of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis