Search Results - (( process detection modified algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…Therefore, the proposed approach modified the TF-IDF algorithm, where the algorithm focused on both sample and feature. …”
    Get full text
    Article
  5. 5
  6. 6

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph
  7. 7

    A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network by Jamaludin, Sallim, Rozlina, Mohamed, Roslina, Abd Hamid

    Published 2015
    “…The experimental result have proved that ACO-PFMDM have improved the overall performance of protein functional module detection. The search process of ACO-PFMDM has converged effectively compared to some state-of-art algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Improving test efficiency through multiple criteria coverage based test case prioritization using modified heuristic algorithm by Joseph, A.K., Radhamani, G., Kallimani, V.

    Published 2016
    “…The fault detection capability of a prioritized test suite is improved up to 15 using Modified PSO which forms the base algorithms for prioritization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    A modified watershed segmentation algorithm for automated lung cancer lesion detection in CT scan images / Nur Najihah Sofia Mohd Marzuki by Mohd Marzuki, Nur Najihah Sofia

    Published 2024
    “…The performance of the segmentation process in conventional and modified watershed segmentation technique for detecting lung lesion, which produce average F-Score is 97.80% and 99.09%, respectively. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…Temporal Video Segmentation (TVS) process is the essential stage in CBVIR which aims to detect transitions between consecutive shots of videos. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Two-factor authentication smart entryway using modified LBPH algorithm by Ayop, Zakiah, Othman, Nur Fadzilah, Anawar, Syarulnaziah, Wan Mohamad Rosdi, Wan Mohamad Hariz, Looi, Wei Hua

    Published 2024
    “…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A semi-synchronous label propagation algorithm with constraints for community detection in complex networks by Chin, J.H., Ratnavelu, K.

    Published 2017
    “…Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. …”
    Get full text
    Get full text
    Article
  16. 16

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…Multivariate Statistical Process Control (MSPC) uses historical data of processes to develop useful process fault detection, diagnosis and control tools. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18

    Investigation Of Edge Detection Techniques Based On Brain Tumor Images by Rosnan, Murni Nur Athirah

    Published 2018
    “…The images undergo three fundamental steps of edge detection techniques. The edge detection operators used to detect the brain tumor are Robert zero-crossing, Sobel operator, Prewitt operator, Canny operator and modified Canny algorithm. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  20. 20