Search Results - (( based detection method algorithm ) OR ( program implementation case algorithm ))

Refine Results
  1. 1

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…The results show that the Case-Based Reasoning model has a great potential to be implemented in diagnosing Thalassaemia cases.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60 by Ngui,, Lin Hui.

    Published 2009
    “…Over the past few years, r esearchers have come up with various algorithms and method in detecti ng human skin colour. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Image processing on intel edison microcontroller for pork detection by Khdhair, Zaid Hadi

    Published 2016
    “…In this research, implementing image processing techniques based on Intel Edison platform is used to handle CVD problem and decrease the detection cost. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    An improved algorithm in test case generation from UML activity diagram using activity path by Hashim, Nor Laily, Salman, Yasir D.

    Published 2011
    “…This paper proposed an improved algorithm to automatically generate test cases directly from UML activity diagram using an activity graph.This algorithm has been implemented as a prototype using UML activity diagrams as inputs to generate test cases.These generated test cases are generated automatically are compared to test cases that are generated manually in order to evaluate the algorithm’s usability and reliability.The result shows that the test cases generated by the developed test case generator program are the same as the one manually derived.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article