Search Results - (( developing formative detection algorithm ) OR ( java classification techniques algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The proposed technique was also compared to the ranking results from the experts. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…As this project’s aim to develop android mobile application system, there are three important modules such as developed GPS system which used Google Maps API as location based for detection of online users. …”
    Get full text
    Get full text
    Student Project
  6. 6

    The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat by Selamat, Noor Saedah

    Published 1996
    “…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Detecting JFIF header using FORHEADER by Kamaruddin Malik, Mohamad, Herawan, Tutut, Mustafa, Mat Deris

    Published 2011
    “…Foremost, Scalpel; however the algorithm used for header detection is not much discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Coalition formation for throughput enhancement via one-sided matching theory by Md Tahir, Mohammad Hazwan, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2016
    “…We prove that the proposed algorithm leads to stable coalition formation in the cognitive radio network and show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to the non-cooperative scenario…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Coalition formation for throughput enhancement via one-sided matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2016
    “…We prove that the proposed algorithm leads to stable coalition formation in the cognitive radio network and show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to the non-cooperative scenario.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Throughput enhancement in cognitive radio network via coalition formation using matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2015
    “…In this paper, we use the concepts from matching theory to form coalitions among cognitive radio users for cooperative spectrum sensing under target detection probability constraint. In the proposed model we make use of one sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying size to improve their individual gains (.e.g. throughput and probability of false alarm). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Prevention of Textual Plagiarism Application by Mohd Nor, Nor Atikah

    Published 2011
    “…The percentage of similarities will then be generated in a text format as the way to ease the lecturers for detecting plagiarism activities among students…”
    Get full text
    Get full text
    Final Year Project
  14. 14

    System setup on jetson nano for smart crowd covid monitoring system by Muhammad Othman, Maliki

    Published 2022
    “…Each grid cell is in charge of detecting objects within itself. Because of its speed and accuracy, YOLO is one of the most well-known object detection algorithms. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The system takes as input a 24 bit RGB colour image which containts face(s). Before the detection process begins, the system pre-processes the image into a format required by the system. …”
    Get full text
    Get full text
    Thesis