Search Results - (( _ detection ((method algorithm) OR (max algorithm)) ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A study of frame timing synchronization for WiMAX applications by V., Jeoti, K.L., Ang, K.M., Yew

    Published 2007
    “…In this paper, we present a study of frame timing synchronization for WiMAX applications. The two synchronization algorithms analyzed are Schmidl and Cox technique and double sliding window packet detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    WIMAX INNER RECEIVER DESIGN by Ang, Ken Li

    Published 2007
    “…Offsets and impairments are deliberately introduced into the system to ensure that the receiver is totally blind and to fully test the proposed algorithm. Results indicate that the proposed method can harness the best features of both worlds. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Automatic spinal deformity detection based on neural network by Kim, Hyoungseop, Ishikawa, Seiji, Khalid, Marzuki, Otsuka, Yoshinori, Shimizu, Hisashi, Nakada, Yasuhiro, Shinomiya, Takasi, Viergever, Max A.

    Published 2003
    “…We propose a technique for automatic spinal deformity detection method from moiré topographic images. Normally the moiré stripes show a symmetric pattern, as a human body is almost symmetric. …”
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9
  10. 10

    Comparative Analysis of Pneumonia Detection from Chest X-Ray Images Using CNN And Transfer Learning by Naveen Kumar, M., Ushasree, ., Che Fuzlina, Fuad

    Published 2024
    “…On a dataset of accessible pneumonia X-rays, the method was tested. This research shows which neural network algorithm is optimal for detecting pneumonia, and how medical practitioners might use it in the actual world. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir by Mohd Akhir, Akmarya Syukhairilnisah

    Published 2014
    “…A second type is the fast handovers will propose to reduce the unnecessary surrender to six different access modes. The mobile WiMAX air interface utilizes orthogonal frequency division multiple access (OFDMA) as the preferred multiple-access method in the downlink (DL) and uplink (UL) for improved multipath performance and bandwidth scalability.All simulations are run using MATLAB software to develop a new Overlay Scanning Mechanism (OSMA) algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Impact of multiplay transmission in mobile WIMAX using overlay scanning / Akmarya Syukhairilnisah Mohd Akhir by Mohd Akhir, Akmarya Syukhairilnisah

    Published 2014
    “…Simulation results are to show that WiMAX coverage by using real world data to detect movement and show that there are strategies that reduce the time required fo rscanning operations significantly.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
    Get full text
    Learning Object
  14. 14

    Automated characterization of fatty liver disease and cirrhosis using curvelet transform and entropy features extracted from ultrasound images by Acharya, U.R., Raghavendra, U., Fujita, H., Hagiwara, Y., Koh, J.E.W., Jen Hong, T., Sudarshan, V.K., Vijayananthan, A., Yeong, C.H., Gudigar, A., Ng, K.H.

    Published 2016
    “…In this work, we are proposing an algorithm to discriminate automatically the normal, FLD and cirrhosis ultrasound images using curvelet transform (CT) method. …”
    Get full text
    Get full text
    Article
  15. 15

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain by Bahrain, Siti Nurul Izzah

    Published 2024
    “…The problems that face anti-spoofing are the need for security enhancement, the lack of biometric authentication, and the system's vulnerabilities in manipulating facial detection. In this project, the Convolutional Neural Network (CNN) algorithm was implemented using TensorFlow in Python to detect fake face images. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item