Search Results - (( solution integration detection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Online Tool to Detect Plagiarized Students' Solutions for Classes' Assignments by Khdair, Hisham S.M

    Published 2010
    “…This tool provide an easy and automated way to enable lecturers to evaluate students' solution for a given assignments. Online Detecting of Assignments' Plagiarism (ODAP) integrates the Longest Common Substring algorithm (LCS) for comparing strings of documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi by Rusdinadi, Saffa Nasuha

    Published 2024
    “…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
    Get full text
    Get full text
    Student Project
  3. 3
  4. 4

    Pothole detection using UAV with deep learning algorithm for road inspection by Abdul Sukor, Nur Sabrina Irwayu, Hashim, Khairil Afendy, Dahlan, Zaki Ahmad

    Published 2024
    “…This paper presents an innovative approach to pothole detection by utilizing Unmanned Aerial Vehicles (UAVs) in combination with a Convolutional Neural Network (CNN) algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7 by Rusdinaidi, Saffa Nasuha, Hashim, Khairil Afendy, Ahmad Dahlan, Zaki

    Published 2024
    “…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
    Get full text
    Get full text
    Thesis
  9. 9

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…As proven by the obtained results, integrating feature selection with ensemble learning is effective for phishing detection; moreover, the scalability and efficiency of such a solution in real-world applications are demonstrated.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…The FBTS integrated with automated edge-preserving regularization technique is first assessed with object detection application. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…The third contribution aims to provide an integrated solution to detect multiple events in different regions-of-interest of a given scene. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Optimal distributed generation and load shedding scheme using artificial bee colony- hill climbing algorithm considering voltage stability and losses indices by Ali Abdallah, Ali Emhemed

    Published 2021
    “…To solve this problem, an optimal load shedding approach, integrated with optimal DG sizing is proposed using the ABC-HC algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Brain stroke detection using medical images by Chew, Xin Ru

    Published 2025
    “…In order to enable automated brain clot detection and adapt to various image variations, machine learning algorithms are integrated for classification. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. Key metrics like the Eye Aspect Ratio (EAR) and lip distance were monitored to identify signs of drowsiness and yawning. …”
    Get full text
    Get full text
    Article
  16. 16

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…Therefore, integrated machine learning techniques comprise J48 and Jrip are proposed as a solution to distinguish malware behaviour more accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    CS-FuzGA-PTS: Maximizing fault detection through optimizing t-way test suite prioritization based on boundary value analysis by Abdullah, Nasser, Kader, Md Abdul, Alsewari, Abdulrahman A., Suliman, Mohamed Fati, Abdullah, Nibras, Diaba, Sayawu Yakubu, Jabbar, Waheb A.

    Published 2024
    “…The core of CS-FuzGA-PTS lies in a new optimization algorithm called CS-FuzGA as a search algorithm. The algorithm integrates adaptive fuzzy logic-controlled Genetic Algorithm (GA) operators with Cuckoo Search (CS). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20