Search Results - (( java application testing algorithm ) OR ( terms detection method algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- method algorithm »
- terms detection »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…The experimental results showed that the proposed algorithms could be practical in terms of effectively detecting road lines and generate lane detection…”
Get full text
Get full text
Get full text
Article -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
9
Vertical-edge-based car-license-plate detection method
Published 2013“…The first contribution is that we propose a fast vertical edge detection algorithm (VEDA) based on the contrast between the grayscale values, which enhances the speed of the CLPD method. …”
Get full text
Get full text
Get full text
Article -
10
Weighting method for modal parameter based damage detection algorithms
Published 2011“…Normally, there is a variance in the sensitivity of different modes and the global stiffness change is derived by taking the algebraic average, which is equivalent to the mean in statistical analysis terms. This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
11
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Therefore, a better algorithm is desired to improve the detection performance in terms of time and accuracy. …”
Get full text
Get full text
Monograph -
12
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023“…In this paper, Sobel edge detection operator and its enhanced algorithm are first discussed in terms of optimal thresholding in C language under Linux platform. …”
Conference Paper -
13
-
14
Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors
Published 2020“…The results showed that the amplitude-independent algorithm performed better in terms of detecting weak muscle activity and resisting false alarms.…”
Get full text
Get full text
Get full text
Article -
15
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The findings reveal which method performed better in terms of accuracy and running time.…”
Get full text
Get full text
Get full text
Article -
16
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis -
19
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
20
Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus
Published 2018“…The resulting average accuracy is 83% for the FHR detection. The detection of the FHR from the maternal abdominal signal by the developed algorithm has also been compared with a short-term monitoring commercial instrument IFM-500 for the assessment of the reliability of the algorithm. …”
Get full text
Get full text
Get full text
Article
