Search Results - (( software identification mining algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Feature extraction from natural language to aid requirements reuse in software product lines engineering / Noor Hasrina Bakar by Noor Hasrina, Bakar

    Published 2016
    “…Then, linguistic tagging is applied to extract software features followed by applying simple clustering algorithms to form groups of common features. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad by Mohammad, Norhasmira

    Published 2022
    “…In addition, the software development based on the suggested method is currently in Technology Readiness Level 4, which means the technology has been validated in the lab. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Single input fuzzy logic controller for yaw control of underwater remotely operated crawler by Mohd Zainal, Muhammad Iktisyam

    Published 2018
    “…This research has discussed and compared the performance of PID, FLC and SIFLC. The algorithm is verified in MATLAB/Simulink software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…The main benefit of this study is the development of an appropriate model for early identification and severity classification of BSR disease in oil palms via remote sensing and data mining approaches rapidly and cost-effectively.…”
    Get full text
    Get full text
    Thesis