Search Results - (( based constructive method algorithm ) OR ( user detection method algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- user detection »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Memory testing is a method that requires an algorithm capable of detecting faulty memory as comprehensively as possible to facilitate the efficient manufacture of fault free memory products. …”
Get full text
Get full text
Thesis -
3
Fault Detection and Identification in Quadrotor System (Quadrotor Robot)
Published 2016“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…In this step, user hear the speech and used the hand labelling method discuss in chapter 2. …”
Get full text
Get full text
Thesis -
5
-
6
Automatic Road Network Recognition and Extraction for Urban Planning
Published 2009“…Besides, edge detection method is applied to further filter out the non-road regions. …”
Get full text
Get full text
Get full text
Article -
7
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
8
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
9
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. …”
Get full text
Get full text
Thesis -
10
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
Get full text
Get full text
Thesis -
11
Wifi positioning system / Amalina Abdul Halim
Published 2006“…During data collection, empirical model method is used in order to construct the reference table. …”
Get full text
Student Project -
12
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis -
13
Development of new code for optical code division multiple access systems
Published 2011“…Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
Get full text
Thesis -
14
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…In addition, the technique is proposed as a new algorithm for joint channel est imation of the multi-cell model based on reduced rank technique handling the active users in serving cell and the strong interferers from the neighboring cells. …”
Get full text
Get full text
Thesis -
15
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…While numerous approaches for early detection continue to evolve, the quest for innovative methods remains constant. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
17
Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin
Published 2021“…The computation time complexity of the Q-Learning-based test coverage algorithm was also analyzed. …”
Get full text
Get full text
Get full text
Thesis -
18
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
19
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
20
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers
