Search Results - (( co detection using algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Cloud co-residency denial of service threat detection inspired by artificial immune system by Ahmad, Azuan, Zainudin, Wan Shafiuddin, Kama, Mohd Nazri, Idris, Norbik Bashah, Mohd Saudi, Madihah

    Published 2018
    “…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System by Ahmad, A, Zainuddin, WS, Kama, MN, Idris, NB, Saudi, MM

    Published 2024
    “…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
    Proceedings Paper
  4. 4

    Diabetic retinopathy detection using Gray-Level Co-Occurrence Matrix / Aliff Azfar Aris by Aris, Aliff Azfar

    Published 2022
    “…The algorithm detects microaneurysms, exudates, and blood vessels from the images. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Modelling semantic context for novelty detection in wildlife scenes by Yong, SP, Deng, JD, Purvis, MP

    Published 2010
    “…An algorithm for outlier detection that employs multiple one-class models is proposed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Advanced chirped spectral modulation technique and particle swarm optimization algorithms for effective indoor air pollution detection and monitoring by Shalaby A.M., Othman N.S., Shalaby M.

    Published 2025
    “…The use of PSO and CSM altogether allowed for detecting carbon dioxide CO2, carbon monoxide CO, and nitrogen dioxide NO2 down to 10?…”
    Article
  7. 7

    Detecting space-time disease clusters with arbitrary shapes and sizes using a co-clustering approach by Ullah, S., Daud, H., Dass, S.C., Khan, H.N., Khalil, A.

    Published 2017
    “…To address this problem, a new algorithm is proposed, which uses a co-clustering strategy to detect prospective and retrospective space-time disease clusters with no restriction on shape and size. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. A clock frequency of 100 MHz is used and implementation is carried out on Xilinx® Virtex-6 FPGA, built in the development platform ML605 edition with JTAG Hardware Co-simulation. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Multiplex real-time PCR detection of respiratory viruses in lower respiratory tract infections in children by Zetti Zainol Rashid, Lee, Pei Chuan, Umi Kalsom Ali, Muttaqillah Najihan Abdul Samat, Tang, Swee Fong

    Published 2018
    “…A single viral pathogen was detected in 48 samples (47.1%), while 21 samples (20.6%) had co-detection of 2 to 4 viral pathogens. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm by Harshada Nerkar, Kundu, Prasanta, Chowdhury, Anandita

    Published 2023
    “…In this paper, we calculate the shortest path between the nodes or substations by using Dijkstra’s algorithm. The betweenness centrality of the node detects the vulnerable nodes in the system from the frequency response point of view.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems by Uwaechia, Anthony Ngozichukwuka

    Published 2018
    “…By using the restricted isometry property, the theoretical analysis of both CoFA and SdMP algorithms and the sufficient conditions for realizing an improved reconstruction performance were presented. …”
    Get full text
    Get full text
    Thesis