Search Results - (( (evolution OR solution) detection using algorithm ) OR ( implementation _ using algorithm ))
Search alternatives:
-
1
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
2
Evolution strategy for collaborative beamforming in wireless sensor networks
Published 2013“…Adaptive-IES is proposed for time-varying channels and the results show that the Adaptive-IES has the ability to detect channel changes. Therefore, it can be concluded that the proposed algorithm is robust in practical implementation.…”
Get full text
Get full text
Get full text
Thesis -
3
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…This method uses an improved Pan-Tompkins algorithm from the previous work with independent of the isoelectric line approach for detecting the QRS onset and the T offset. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The purpose of this dissertation was to implement OSI Transport Layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall. …”
Get full text
Get full text
Thesis -
5
Development of symbolic algorithms for certain algebraic processes
Published 2007“…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
Get full text
Get full text
Get full text
Monograph -
6
Development of symbolic algorithms for certain algebraic processes
Published 2007“…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
Get full text
Get full text
Get full text
Monograph -
7
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
8
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
9
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
10
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
11
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…Thus, this system aims to solve the problems, by developing mobile navigation with safety features by taking UTeM campus as our scope of the study. The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
12
Cars detection in stitched image using morphological approach
Published 2017“…Related algorithms using mathematical approach such as alpha blending will be implemented in the project to enhance the image stitching method for a better quality stitched image. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
14
Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation
Published 2019“…The simulation results from this study has established that GWO is able to produce promising solutions by generating the lowest operating time among other reviewed algorithms. …”
Get full text
Get full text
Thesis -
15
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…After classifying the time set using the canopy with the K-means algorithm and the vector representation weighted by factors, the clustering impact is assessed using purity, precision, recall, and F value. …”
Article -
16
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…Although there are many methods of ensuring network security in IoT, such as using encryption, firewalls, and intrusion detection systems, the issue of security is still not been fully solved. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…The proposed method will be utilized to produce the optimal solution in finding fuzzy parameter before implementing the fuzzy technique in the dataset chosen. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Evoluation strategy for collaborative beamforming in wireless sensor networks
Published 2013“…Adaptive-JES is proposed for time-varying channels and the results show that the Adaptive-JES has the ability to detect channel changes. Therefore, it can be concluded that the proposed algorithm is robust in practical implementation.…”
Get full text
Get full text
Get full text
Thesis -
20
Haar cascade algorithm for microsleep detection
Published 2025“…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
Get full text
Get full text
Article
