Search Results - (( java implementation phase algorithm ) OR ( programming usage detection algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…However, every single tool has different ways of detection and accuracy of the detection. This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Reactive power imbalance method for islanding detection in micro-grid operation by Shamshiri, Meysam, Sapar, Ahmad Farid, Chin, Kim Gan, Tengga Daram, Revinnath, Ab Ghani, Mohd Ruddin

    Published 2014
    “…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
    Proceedings Paper
  10. 10

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
    Get full text
    Thesis
  11. 11

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…Next, the KF programming algorithm managed to diminish the measurement noise including the Main bang and flaw echo of the ultrasonic sensor. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    REAL TIME ABNORMAL SOUND DETECTION AND CLASSIFICATION FOR HOME ENVIRONMENT by MOHAMED AMIN, SITI NUR AZIMAH

    Published 2011
    “…Gaussian Mixture Model (GMM) technique is suitable for usage in Matlab software. Signals from sensor will be detected and MFCC will extract the features which meet the requirement decided. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…When these conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus by Mohamad Yunus, Ahmad Kamil

    Published 2015
    “…When certain conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Leaf condition analysis using convolutional neural network and vision transformer by Yong, Wai Chun, Ng, Kok Why, Haw, Su Cheng, Naveen, Palanichamy, Ng, Seng Beng

    Published 2024
    “…Besides, existing leaf disease detection programs do not provide an optimized user’s experience. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection by Eustacius Jude, Anak Joseph Linggong

    Published 2019
    “…The results obtained without image segmentations able to detect a smaller tumour. By applying image segmentation to localised the FBTS technique, the detection of the tumour is enhanced. …”
    Get full text
    Get full text
    Get full text
    Thesis