Search Results - (( _ detection ((method algorithm) OR (max algorithm)) ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- method algorithm »
- java implication »
- max algorithm »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
3
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
4
Analysis of WiMAX Positioning Using Received- Signal-Strength Method
Published 2013“…This paper presents an analysis of WiMAX positioning by using received-signal-strength (RSS) method. …”
Get full text
Get full text
Get full text
Article -
5
A study of frame timing synchronization for WiMAX applications
Published 2007“…In this paper, we present a study of frame timing synchronization for WiMAX applications. The two synchronization algorithms analyzed are Schmidl and Cox technique and double sliding window packet detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
WIMAX INNER RECEIVER DESIGN
Published 2007“…Offsets and impairments are deliberately introduced into the system to ensure that the receiver is totally blind and to fully test the proposed algorithm. Results indicate that the proposed method can harness the best features of both worlds. …”
Get full text
Get full text
Final Year Project -
7
Automatic spinal deformity detection based on neural network
Published 2003“…We propose a technique for automatic spinal deformity detection method from moiré topographic images. Normally the moiré stripes show a symmetric pattern, as a human body is almost symmetric. …”
Get full text
Get full text
Book Section -
8
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
9
-
10
Comparative Analysis of Pneumonia Detection from Chest X-Ray Images Using CNN And Transfer Learning
Published 2024“…On a dataset of accessible pneumonia X-rays, the method was tested. This research shows which neural network algorithm is optimal for detecting pneumonia, and how medical practitioners might use it in the actual world. …”
Get full text
Get full text
Get full text
Article -
11
Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…A second type is the fast handovers will propose to reduce the unnecessary surrender to six different access modes. The mobile WiMAX air interface utilizes orthogonal frequency division multiple access (OFDMA) as the preferred multiple-access method in the downlink (DL) and uplink (UL) for improved multipath performance and bandwidth scalability.All simulations are run using MATLAB software to develop a new Overlay Scanning Mechanism (OSMA) algorithm. …”
Get full text
Get full text
Article -
12
Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…Simulation results are to show that WiMAX coverage by using real world data to detect movement and show that there are strategies that reduce the time required fo rscanning operations significantly.…”
Get full text
Get full text
Thesis -
13
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
Get full text
Learning Object -
14
Automated characterization of fatty liver disease and cirrhosis using curvelet transform and entropy features extracted from ultrasound images
Published 2016“…In this work, we are proposing an algorithm to discriminate automatically the normal, FLD and cirrhosis ultrasound images using curvelet transform (CT) method. …”
Get full text
Get full text
Article -
15
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
16
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
18
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
Get full text
Get full text
Get full text
Thesis -
19
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…The problems that face anti-spoofing are the need for security enhancement, the lack of biometric authentication, and the system's vulnerabilities in manipulating facial detection. In this project, the Convolutional Neural Network (CNN) algorithm was implemented using TensorFlow in Python to detect fake face images. …”
Get full text
Get full text
Thesis -
20
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
