Search Results - (( using processing force algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- using processing »
- processing force »
- force algorithm »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…These newly developed algorithms convert unmeasurable image to measureable image using image processing technique. …”
Get full text
Get full text
Thesis -
6
Cryptanalysis in cryptographic algorithm design
Published 2006“…Brute force is the process of searching for all possible values of the key. …”
Get full text
Conference or Workshop Item -
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm
Published 2021“…Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
Get full text
Get full text
Thesis -
10
Natural gas liquid (NGL) distillation process using driving force and thermal pinch analysis methods: Energy and economic assessment / Munawar Zaman Shahruddin ... [et al.]
Published 2020“…This research proposes the methodology to determine the optimal sequence of distillation columns by using driving force method. Then, thermal pinch analysis is applied to obtain further energy saving in the process. …”
Get full text
Get full text
Article -
11
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…There is also possibility that the design does not meet specification thus forcing the process to be repeated. This project describe how Genetic Algorithm (GA) could be used to optimize the process of designing analog filter by considering such as magnitude response. …”
Get full text
Get full text
Thesis -
12
Route Planning Analysis In Holes Drilling Process Using Magnetic Optimization Algorithm For Electronic Manufacturing Sector
Published 2013“…Most of the computer numerical controlled machines used nearest neighbour algorithm to plan the route for the drill bit to travel. …”
Get full text
Get full text
Get full text
Article -
13
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Hence, this study proposed the development of an automated negative lightning return strokes characterization using a brute-force search algorithm. A total of 170 lightning electric field waveforms were characterized automatically using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Automated Negative Lightning Return Strokes Characterization Using Brute-Force Search Algorithm
Published 2024Get full text
journal::journal article -
16
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011Get full text
Get full text
Thesis -
17
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Therefore, output response from the measurement requires a filtering process to suppress the response from operating forces and retain only the response from the artificially induced force. …”
Get full text
Get full text
Thesis -
18
Modeling and optimization of cold extrusion process by using response surface methodology and metaheuristic approaches
Published 2018“…Subsequently, the analytical approach and metaheuristic algorithms, specifically the particle swarm optimization, cuckoo search algorithm (CSA) and flower pollination algorithm, were applied to optimize the extrusion process parameters. …”
Get full text
Get full text
Article -
19
Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column
Published 2005“…This system serves as the basis for the inverse models of the mass transfer process in which fuzzy approach was used in solving the problems. …”
Get full text
Get full text
Thesis -
20
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
Get full text
Get full text
Thesis
