Search Results - (( co detection using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- using algorithm »
- co detection »
-
1
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
2
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
Proceedings Paper -
4
Diabetic retinopathy detection using Gray-Level Co-Occurrence Matrix / Aliff Azfar Aris
Published 2022“…The algorithm detects microaneurysms, exudates, and blood vessels from the images. …”
Get full text
Get full text
Thesis -
5
Modelling semantic context for novelty detection in wildlife scenes
Published 2010“…An algorithm for outlier detection that employs multiple one-class models is proposed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Advanced chirped spectral modulation technique and particle swarm optimization algorithms for effective indoor air pollution detection and monitoring
Published 2025“…The use of PSO and CSM altogether allowed for detecting carbon dioxide CO2, carbon monoxide CO, and nitrogen dioxide NO2 down to 10?…”
Article -
7
Detecting space-time disease clusters with arbitrary shapes and sizes using a co-clustering approach
Published 2017“…To address this problem, a new algorithm is proposed, which uses a co-clustering strategy to detect prospective and retrospective space-time disease clusters with no restriction on shape and size. …”
Get full text
Get full text
Article -
8
-
9
Survival analysis for the identified cancer gene subtype from the co-clustering algorithm
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Detection of Gaussian noise and its level using deep convolutional neural network
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. A clock frequency of 100 MHz is used and implementation is carried out on Xilinx® Virtex-6 FPGA, built in the development platform ML605 edition with JTAG Hardware Co-simulation. …”
Get full text
Get full text
Article -
13
-
14
-
15
Multiplex real-time PCR detection of respiratory viruses in lower respiratory tract infections in children
Published 2018“…A single viral pathogen was detected in 48 samples (47.1%), while 21 samples (20.6%) had co-detection of 2 to 4 viral pathogens. …”
Get full text
Get full text
Get full text
Article -
16
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm
Published 2023“…In this paper, we calculate the shortest path between the nodes or substations by using Dijkstra’s algorithm. The betweenness centrality of the node detects the vulnerable nodes in the system from the frequency response point of view.…”
Get full text
Get full text
Get full text
Article -
18
Fundus image analysis for the detection of diabetic eye diseases-a review
Published 2012Get full text
Working Paper -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
20
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…By using the restricted isometry property, the theoretical analysis of both CoFA and SdMP algorithms and the sufficient conditions for realizing an improved reconstruction performance were presented. …”
Get full text
Get full text
Thesis
