Search Results - (( pattern detection research algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- detection research »
- research algorithm »
- pattern detection »
- testing algorithm »
- java application »
-
1
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Complex event pattern detection has become an emerging research area in various monitoring applications. …”
Get full text
Get full text
Monograph -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
5
Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI
Published 2019“…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
Get full text
Get full text
Monograph -
6
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
Get full text
Get full text
Thesis -
7
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm
Published 2019“…Other color model such as HSV and benchmarked algorithm are having slightly low detection rates due to some false face detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
13
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). The main motivation for this research is to assist Sabah Electricity Sdn. …”
Conference Paper -
14
Analysis of banana plant health using machine learning techniques
Published 2024“…Moving forward, exploring datasets in video formats for disease detection in banana leaves through tailored machine learning algorithms presents a promising avenue for research.…”
Get full text
Get full text
Get full text
Article -
15
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
16
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…The main idea of this research is to get the lips features from facial images before proceed to the next process which is pattern matching. …”
Get full text
Get full text
Thesis -
17
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
18
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The algorithm enhances the recognition ability of the system compared to manual extraction and labeling of pattern classes. …”
Get full text
Get full text
Thesis -
19
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
20
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project
