Search Results - (( process detection drops algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…Packet-based detection processes every payload on the wire, which degrades the performance of network intrusion detection system (NIDS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…The results obtained were satisfying, where the algorithm were able to detect and remove the rain streaks without losing the aliveness of the scene. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…To address this problem, we provide suggestions for mitigating data leakage in the training process and analyzing the sensitivity of different algorithms. …”
    Get full text
    Get full text
    Article
  9. 9

    ACCURACY ENHANCEMENT OF OMR FOR EXAM MARKING WITHOUT PRE-SET TEMPLATE USING IMAGE PROCESSING by Tow, Jingyi

    Published 2019
    “…The results were compared against manual marking as the control and existing image processing algorithms. The metrics used are F1 score and percentage error for accuracy of detected answer options and marking fault respectively. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications by Lim , Chee Peng

    Published 2016
    “…Tube B images are needed to evaluate the performance of the developed defect detection algorithm under different radiography conditions. …”
    Get full text
    Monograph
  13. 13

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…Objectives: An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm, signal drop and network breakdown. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item