Search Results - (( software evaluation detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of seven segment display recognition using TensorFlow on Raspberry Pi by Gunawan, Teddy Surya, Mohammad Reduwan, Haque, Yaacob, Mashkuri, Mohamed Azmin, Nor Fadhillah, Ismail, Nanang, Ismail, Md Yusof, Kartiwi, Mira, A. Rahman, Azhar

    Published 2022
    “…The design of hardware, software, and algorithms will be discussed. SSD-MobileNet will be used for subsequent experiments, out of the two architectures evaluated, Tiny YOLO and SSD-MobileNet. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Experimental evaluation of data fusion algorithm for residual generation in detecting UAV servo actuator fault by Sahwee Z., Rahman N.A., Sahari K.S.M.

    Published 2023
    “…Algorithms; Data fusion; Hardware; Military vehicles; Redundancy; Software reliability; Unmanned aerial vehicles (UAV); Analytical redundancy; Data fusion algorithm; Experimental evaluation; Fault detection algorithm; Hostile environments; Model reference methods; On-board fault detection; Software and hardwares; Fault detection…”
    Article
  5. 5

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Four (4) SRS have been collected as our case study and text mining technique is used to classify the ambiguity and unambiguity requirements. Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun by Goh, Wei Sheng, Wan Din, Wan Isni Sofiah, Waseem, Quadri, Zabidi, A.

    Published 2023
    “…The purpose of this research project is to evaluate currently available crack detection systems and to develop an automated crack detection system using Aggregate Channel Features (ACF) that can be used with unmanned aerial vehicles (UAV). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Hardware-based solutions such as radars and LIDAR are been proposed but are too expensive to be maintained and produce little valuable information to human operators at traffic monitoring systems. Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    CDRA: A Community Detection based Routing Algorithm for Link Failure Recovery in Software Defined Networks by Daha, M.Y., Zahid, M.S.M., Isyaku, B., Alashhab, A.A.

    Published 2021
    “…This paper presents a community detection-based routing algorithm (CDRA) for link failure recovery in SDN. …”
    Get full text
    Get full text
    Article