Search Results - (( based classification system algorithm ) OR ( using simulation using algorithm ))
Search alternatives:
- classification system »
- based classification »
- system algorithm »
- simulation using »
- using algorithm »
-
1
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
3
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
4
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
5
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Conference or Workshop Item -
6
Embedded Fuzzy Classifier for Detection and Classification of Preseizure state using Real EEG data
Published 2014“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Book Section -
7
Plant recognition based on identification of leaf image using image processing / Nor Silawati Sha’ari
Published 2018“…In this paper, by using the database available in the internet and using Neural Network (NN) as training algorithm, plant recognition based on leaves image would be developed. …”
Get full text
Get full text
Student Project -
8
Optimal placement and sizing of FACTS devices for optimal power flow using metaheuristic optimizers
Published 2022“…These algorithms are selected from the different metaheuristics classification groups, where the implementation of these algorithms into the said problems will be tested on the modified IEEE 14-bus system. …”
Get full text
Get full text
Get full text
Article -
9
Embedded Fuzzy Classifier for Detection and Classification of Preseizure State Using Real EEG Data
Published 2013“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Get full text
Book Section -
10
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, as well as for clinicians to use this system for training as well as for academic exercises. …”
Get full text
Get full text
Article -
11
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
12
A FUZZY LOGIC ALGORITHM FOR HEART RATE MONITORING
Published 2014Get full text
Get full text
Final Year Project -
13
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…The experiment was conducted in a controlled lab environment using open source tools by implementing dynamic analysis on 1260 datasets from the Android Malware Genome Project. Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
14
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
15
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
16
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, as well as for clinicians to use this system for training as well as for academic exercises. …”
Get full text
Get full text
Citation Index Journal -
17
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Thus it is a suitable model to be used in real time implementation through a Digital Signal Processor (DSP)- based embedded system for power quality disturbances detection and classification.…”
Get full text
Get full text
Thesis -
18
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
19
Fault classification in smart distribution network using support vector machine
Published 2023“…In this paper, a machine-learning algorithm known as Support Vector Machine (SVM) for fault type classification in distribution system has been developed. …”
Article -
20
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The system is simulated using EPANET (Environmental Prediction Agency Network) software based on actual water distribution system (WDS) data from Benghazi city, Libya. …”
Get full text
Get full text
Thesis
