Search Results - (( developing agent detection algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- developing agent »
- java application »
- agent detection »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
Conference Paper -
3
-
4
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
5
-
6
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
Get full text
Get full text
Thesis -
7
The design for antrophomorphic sociable agent interaction through emotion detection
Published 2003Get full text
Get full text
Conference or Workshop Item -
8
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
Get full text
Get full text
Thesis -
9
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…In this paper we present three software-based agents built using kernel machines to perform automated, real-time intruder detection in surveillance systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…If voice quality degradation is detected, then the agent performs further rate adaptation to improve the quality. …”
Get full text
Get full text
Thesis -
11
A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control
Published 2014“…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
Get full text
Get full text
Conference or Workshop Item -
12
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…It consists of a device database and two processing components: (1) device identification module and (2) device capabilities detection module. The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
Get full text
Get full text
Thesis -
13
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
16
A study on component-based technology for development of complex bioinformatics software
Published 2004“…Othman proposed a clustering algorithm named BTreeBicluster. The BTreeBicluster starts with the development of GO tree and enriching it with expression similarity from the Sacchromyces genes. …”
Get full text
Get full text
Monograph -
17
A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging
Published 2021“…Our method's performance is superior to the conventional deep learning models in detecting 8 out of 11 classes on the Camvid road segmentation scene dataset. …”
Get full text
Get full text
Article -
18
Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI
Published 2024“…This study underscores the potential of radiomic analysis to improve the accuracy of medical reports, reduce dependency on contrast agents, and enhance early detection of cervical cancer.…”
Get full text
Get full text
Get full text
Thesis -
19
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
Get full text
Get full text
Thesis -
20
A smart spectrum access technique for dynamic multi-hop routing in cognitive radio-based disaster response networks
Published 2022“…The multi-hop route selection is executed using the Hybrid Spiral Penguin Optimization (HSPO) algorithm based on the decision made by the DE-D2PG. …”
Get full text
Get full text
Get full text
Thesis
