Search Results - (( solution negative detection algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…Based on these results, future research should focus on enhancing the core algorithm to be more resilient to variable lighting and distance, thereby reducing false positives and negatives. …”
    Get full text
    Get full text
    Article
  8. 8

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…This project attempts to accurately detect the type of dyslexic handwriting. Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The solution integrates a Telegram bot for streamlined communication, utilizing PiCamera to capture facial photos and promptly detect signs of drowsiness. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The solution integrates a Telegram bot for streamlined communication, utilizing Pi Camera to capture facial photos and promptly detect signs of drowsiness. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15

    Smart Digital Signage With Eye Tracking System by Chung , Soon Zhi

    Published 2017
    “…A sanity checking algorithm is proposed to filter out the wrong detected eyes and improve the overall detection rate. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…However, such detection method still lacks in differentiate the malware behaviours and cause the rate of falsely identified rate, i.e., false positive and false negative increased. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection by Mazaheri, Amin

    Published 2018
    “…With the advancement of integrated technology, in-situ electrochemical systems provide feasible solution for sensitive detection and miniaturized platform. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…The effectiveness of the IADS has been evaluated under different detection capabilities (i.e., false positive, false negative, true positive, true negative, false alarm, accuracy,detection rate, attack data detection rate, normal data detection rate) and detection times using the DARPA 1999 and ISCX 2012 intrusion detection benchmark datasets as well as with Live-data. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Coordinated Malware Eradication And Remediation Project (CMERP) by Abdollah, Mohd Faizal, S.M.M Yassin, S.M.Warusia Mohamed, Mas’ud, Mohd Zaki, Selamat, Siti Rahayu, Yusof, Robiah, Ahmad, Rabiah, Shahrin @ Sahibuddin, Shahrin

    Published 2019
    “…However, such detection method still lack in differentiate the malwares behaviours and cause the rate of falsely identified rate i.e. false positive and false negative increased. …”
    Get full text
    Get full text
    Get full text
    Technical Report