Search Results - (( program rule detection algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- java application »
- rule detection »
- program rule »
-
1
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…This paper presents a unified approach to process fault detection and diagnosis (FDD) intelligent program for pre-cut fatty acid fractionation column. …”
Get full text
Get full text
Article -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
4
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018Get full text
Get full text
Student Project -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
-
7
-
8
-
9
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
10
Fault detection with optimum March Test Algorithm
Published 2012“…Therefore to improve fault detection, an automation program is developed based on sequence operation (SQ) generation rules. …”
Get full text
Conference or Workshop Item -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
12
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
13
Moving detection using cellular neural network (CNN)
Published 2008“…Ten images are selected to be used in this project. The algorithm created is used to detect the ball in the images. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
15
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which, the legal and illegal behaviours could identify. …”
Get full text
Get full text
Get full text
Article -
16
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…Tube B images are needed to evaluate the performance of the developed defect detection algorithm under different radiography conditions. …”
Get full text
Monograph -
17
-
18
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
19
-
20
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which the legal and illegal behaviours could identified. …”
Get full text
Get full text
Get full text
Technical Report
