Search Results - (( variable detection machine algorithm ) OR ( java applications testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Pure intelligent monitoring system for steam economizer trips by Basim Ismail F., Hamzah Abed K., Singh D., Shakir Nasif M.

    Published 2023
    “…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
    Conference Paper
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques by Sharuddin, Nur Amirah Atikah

    Published 2025
    “…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study by Islam, Saima Sharleen, Haque, Md Samiul, Miah, M. Saef Ullah, Sarwar, Talha, Nugraha, Ramdhan

    Published 2022
    “…For this reason, this study compares eleven machine learning algorithms to determine which one produces the best accuracy for predicting thyroid risk accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine by Molla Salilew, W., Ambri Abdul Karim, Z., Alemu Lemma, T.

    Published 2022
    “…The present study investigates the accuracy of different machine learning classification algorithms with three different data smoothing techniques for gas turbine fault detection and isolation task. …”
    Get full text
    Get full text
    Article
  13. 13

    Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine by Molla Salilew, W., Ambri Abdul Karim, Z., Alemu Lemma, T.

    Published 2022
    “…The present study investigates the accuracy of different machine learning classification algorithms with three different data smoothing techniques for gas turbine fault detection and isolation task. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…Ultimately, the sorting algorithm performance came to be evaluated by support vector machine algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Predictive Modelling of Stroke Occurrence among Patients using Machine Learning by Sures, Narayasamy, Thilagamalar, Maniam

    Published 2023
    “…Advanced machine learning algorithms, including logistic regression, decision trees, random forests, and support vector machines, were utilized to analyses the dataset and develop a predictive model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Detection of phishing websites using machine learning approaches by Farashazillah Yahya, Magnus Anai, Ryan Isaac W Mahibol, Sidney Allister Frankie, Rio Guntur Utomo, Chong Kim Ying, Eric Ling Nin Wei

    Published 2021
    “…Phishing websites can be detected using machine learning by classifying the websites into legitimate or illegitimate websites. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  17. 17
  18. 18

    Cross-domain analysis of YOLOv8 and faster R-CNN models for enhanced precision in maritime object detection by Zainal Abidin, Zulkifli, Norazaruddin, Muhammad Aiman, Tengku Anuar, Tengku Aizat

    Published 2025
    “…Recent advancements in machine vision, particularly through Convolutional Neural Networks (CNNs), have significantly improved object detection in maritime environments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  20. 20