Search Results - (( processes evaluation detection algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article
  4. 4

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  7. 7

    A semi-synchronous label propagation algorithm with constraints for community detection in complex networks by Chin, J.H., Ratnavelu, K.

    Published 2017
    “…Constraints are utilised during the label propagation and community merging processes. The performance of the proposed algorithm is evaluated on various benchmark and real-world networks. …”
    Get full text
    Get full text
    Article
  8. 8

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Execution time optimization analysis on multiple algorithms performance of moving object edge detection by Islam S.Z., Islam S.Z., Jidin R., Mohd. Ali Mohd.A.

    Published 2023
    “…This paper analyzes execution time optimization analysis between Sobel and Canny image processing algorithms in terms of moving objects edge detection. …”
    Conference paper
  10. 10

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Each image went through the embedding process by the evaluated algorithms. This enhanced image data numbers then went through Logistic Regression as a classifier. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Broad impulse noise model has been employed for the evaluation process, to investigate the robustness of the method. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  13. 13

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  14. 14

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…The algorithm for bleed detection consist of image processing to separate brain from the skull, rotation and realignment of the brain for mid-sagittal plane determination which used in bleeding detection. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A Fast Vertical Edge Detection Algorithm for Car License Plate Detection by Ali Al-Ghaili, Abbas Mohammed

    Published 2009
    “…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fast temporal video segmentation based on Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H., Al-Haddad, Syed Abdul Rahman, Saripan, M. Iqbal, Mahmood, Basheera M., Hussien, Aseel

    Published 2020
    “…The proposed algorithm has been evaluated on four datasets. In addition, the performance of the proposed algorithm is compared to several state-of-the-art TVS algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Extremal region selection for MSER detection in food recognition by Razali, Mohd Norhisham, Manshor, Noridayu, Abdul Halin, Alfian, Mustapha, Norwati, Yaakob, Razali

    Published 2021
    “…Therefore, this research proposes an Extremal Region Selection (ERS) algorithm to improve MSER detection by reducing the number of irrelevant extremal regions by using unsupervised learning based on the k-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The proposed algorithm has been evaluated on four datasets: TRECVID 2001, TRECVID 2005, TRECVID 2006, and TRECVID 2007. …”
    Get full text
    Get full text
    Get full text
    Thesis