Search Results - (( program implementation developing algorithm ) OR ( data detection techniques algorithm ))
Search alternatives:
- implementation developing »
- program implementation »
- detection techniques »
- data detection »
-
1
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
2
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The shortest distance is defined as best result. A set of data contains position of marbles is tested for ACO algorithm in the prototype. …”
Get full text
Get full text
Thesis -
3
-
4
Fuzzy speed controller for DC motor drives
Published 2013“…Clanguage programming will be used as assemble language for programming and develop the algorithm and interface.…”
Get full text
Get full text
Undergraduates Project Papers -
5
Development of deep learning based user-friendly interface for fruit quality detection
Published 2024“…The implementation of deep learning algorithms has contributed to various applications related to the detection of fruit quality. …”
Get full text
Get full text
Get full text
Article -
6
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
Get full text
Get full text
Student Project -
7
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The overall software design is divided into three modules which are Image Acquisition, Image Processing and Object Detection, and Data Transmission module. The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
8
Image processing on intel edison microcontroller for pork detection
Published 2016“…In this research, implementing image processing techniques based on Intel Edison platform is used to handle CVD problem and decrease the detection cost. …”
Get full text
Get full text
Thesis -
9
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
Get full text
Get full text
Monograph -
10
Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication
Published 2013“…When the fault occurs, the sensor will send the signals to the PIC16F77A. The PIC is programmed to process the data and send the signals to the GSM modem. …”
Get full text
Get full text
Conference or Workshop Item -
11
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
12
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…There are various data mining tools available to analyze data related android malware detection. …”
Get full text
Get full text
Get full text
Article -
13
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
14
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
15
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
16
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
17
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
18
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
19
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
20
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article
