Search Results - (( problem presentation detection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- problem presentation »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…To address this problem, this research presents a fake news detection method that combines different features and developing methods for the most crucial phases in the detection process, including feature extraction, feature selection and fake news detection phases. …”
Get full text
Get full text
Get full text
Thesis -
4
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…In this paper, an improved method for intrusion detection for binary classification was presented and discussed in detail. …”
Get full text
Get full text
Get full text
Article -
5
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis -
6
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
Get full text
Get full text
Get full text
Article -
7
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
8
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…Moreover, present smart traffic light system requires to adapt with new algorithms and technologies, for instance vision sensors that are able to detect emergency vehicles that needs to pass by a traffic light. …”
Get full text
Get full text
Thesis -
9
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. In this paper, an improved intrusion detection algorithm for multiclass classification was presented and discussed in detail. …”
Get full text
Get full text
Get full text
Article -
10
An optimal mesh algorithm for remote protein homology detection
Published 2011“…Remote protein homology detection is a problem of detecting evolutionary relationship between proteins at low sequence similarity level. …”
Get full text
Get full text
Article -
11
An analysis of image quality assessment algorithm to detect the presence of unnatural contrast enhancement
Published 2016“…The main objective of this paper is to present an extensive review on existing Image Quality Assessment Algorithm (IQA) in order to detect the presence of unnatural contrast enhancement. …”
Get full text
Get full text
Get full text
Article -
12
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. …”
Get full text
Get full text
Get full text
Article -
13
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
14
Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant
Published 2008“…Keywords: Fault Detection, Thermal Power Plant, Neural Networks (ANNs), Genetic Algorithms (GAs). …”
Get full text
Get full text
Conference or Workshop Item -
15
Artificial Intelligence Application in Power Generation Industry: Initial considerations
Published 2023Conference Paper -
16
-
17
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
18
Evaluation of fall detection classification approaches
Published 2012“…Accidents such as falling can be a serious problem for the elderly. An accurate automatic fall detection system can help elderly people be safe in every situation. …”
Get full text
Get full text
Conference or Workshop Item -
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
