Search Results - (( basic visualization learning algorithm ) OR ( using detection drops algorithm ))

Refine Results
  1. 1

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…The role of Software Visualization (SV) has been involved to overcome the complexity and problems in the learning programming. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    QoS evaluation of different TCPs congestion control algorithm using NS2 by Tarmizi, M., Albagul, A., Khalifa, Othman Omran, Wahyudi, Martono

    Published 2006
    “…The second is RED (Random Early Detection), which drops incoming packets at a certain probability.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    A review on monocular tracking and mapping: from model-based to data-driven methods by Gadipudi, N., Elamvazuthi, I., Izhar, L.I., Tiwari, L., Hebbalaguppe, R., Lu, C.-K., Doss, A.S.A.

    Published 2022
    “…This article starts by introducing the basic sensor systems and analyzing the evolution of monocular tracking and mapping algorithms through bibliometric data. …”
    Get full text
    Get full text
    Article
  7. 7

    Performance study of large block forward error correction with random early detection queue policy by Almomani, Omar, Ghazali, Osman, Hassan, Suhaidi

    Published 2009
    “…In this paper, we report an investigation on performance of the forward error correction (FEC) with random early detection (RED) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while RED is an active queue management algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…The results obtained were satisfying, where the algorithm were able to detect and remove the rain streaks without losing the aliveness of the scene. …”
    Get full text
    Get full text
    Thesis
  9. 9

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…In addition, it is also aimed to improve the resource consumption of the packet-based detection approach. CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer by Tehseen Mazhar, Inayatul Haq, Allah Ditta, Syed Agha Hassnain Mohsan, Faisal Rehman, Imran Zafar, Jualang Azlan Gansau, Lucky Poh Wah Goh

    Published 2023
    “…Moreover, this paper also defined the basic requirements for creating a skin cancer detection application, which revolves around two main issues: the full segmentation image and the tracking of the lesion on the skin using deep learning. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…However, the accuracy is dropped to 50% when the condition is dark. This is due to the system is unable to detect the vehicle in such condition.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…Our study uses three well-known intrusion detection datasets: NSL-KDD, UNSW-NB15, and KDDCUP99. …”
    Get full text
    Get full text
    Article
  16. 16

    Adaptive unified neural network for dynamic power quality compensation by Ghazanfarpour, Behzad, Mohd Radzi, Mohd Amran, Mariun, Norman, Shoorangiz, Reza

    Published 2013
    “…For compensating the fault, another controller plant is implemented that uses Levenberg-Marquardt backpropagation algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications by Lim , Chee Peng

    Published 2016
    “…In this report, the research on welding defect detection and classification using radiograph images is presented. …”
    Get full text
    Monograph
  18. 18

    Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease by Temidayo Oluwatosin Omotehinwa, David Opeoluwa Oyewola, Ervin Gubin Moung

    Published 2024
    “…This aimed to optimize the Light Gradient-Boosting Machine (LightGBM) algorithm to enhance its performance and accuracy in the early detection of CHD, providing a reliable, cost-effective, and non-invasive diagnostic tool. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Performance enhancement of DCCP TCP - like over long delay link networks by Awang Nor, Shahrudin, Hassan, Suhaidi, Ghazali, Osman, M. Kadhum, Mohammed, Omar, Mohd Hasbullah

    Published 2012
    “…Instead of halving the current congestion window when congestion events are detected, the reduction of current congestion window drop has been shown to improve the DCCP TCP-like throughput with minimal drop packet percentage.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Furthermore, it achieved approximately 50 Frames per Second (FPS) using a live camera, meeting the real-time detection requirements. …”
    Get full text
    Get full text
    Thesis