Search Results - (( basic detection system algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system by M.H., Ali, Mohamad, Fadlizolkipi, Ahmad Firdaus, Zainal Abidin, Nik Zulkarnaen, Khidzir

    Published 2018
    “…There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…The new method to detect motion is "vision motion detection". It is the artificial way of machine vision system compared to human's vision in detecting motion. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods by Ng, Ing Kye

    Published 2014
    “…"Motion gesture is one of the gesture recognition algorithms which provide touchless interaction within a system. …”
    Get full text
    Get full text
    Academic Exercise
  19. 19

    Development of land target following system of hexacopter by Zakaria, Abdul Hafiz, Mohd Mustafah, Yasir, M. Hatta, Muhd. Mudzakkir, N. Azlan, Muhd. Nadzif

    Published 2015
    “…A few experiments were conducted to get the performance of the methods focusing on color detection algorithms. The results of the experiments show that different approach angle and lighting of the hexacopter will result in different level of accuracy of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20