Search Results - (( developing mode detection algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The Curvature Damage Factor (CDF) developed by Wahab and Roeck (1999) computes the change in mode shape curvature between two sets of mode vectors, i.e. undamaged and damaged conditions. …”
    Get full text
    Get full text
    Article
  3. 3

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode. by Tan , Beng Ghee

    Published 2016
    “…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Focal and non-focal epilepsy localization: a review by Hussein, Ahmed Faeq, N., Arunkumar, Gomes, Gorakanage Arosha Chandima, Alzubaidi, Abbas K., Habash, Qais Ahmed, Granados, Luz Santamaria, Moreno, Juan Francisco Mendoza, Gonzalez, Gustavo Ramirez

    Published 2018
    “…Generally, the techniques developed for detecting the epileptic seizures were based on tensors, entropy, empirical mode decomposition, wavelet transform and dynamic analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Stiffness reduction index for detection of damage location: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The study has adopted the first four bending modes to examine the sensitivity of both existing as well as developed damage location indices. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2005
    “…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…Finally, the collision avoidance algorithm is verified through MATLAB software. Various cases are tested to demonstrate the robustness of both collision detection and avoidance algorithms.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…Close results between the performance of the developed sorting algorithm and SVM algorithm demonstrate that it is satisfactory and efficient. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A preliminary lightweight random forest approach-based image classification for plant disease detection by Mashitah Ibrahim, Muzaffar Hamzah, Mohammad Fadhli Asli

    Published 2022
    “…In recent years, the rapid development of environmental sensors and artificial intelligence is changing the traditional mode of agricultural production and moving towards intelligent and efficient precision agriculture. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…To develop intelligent leak detection system through Hilbert-Huang Transform (HHT) analysis, the selection for IMF must be automated and self-decision making process through the system. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…To develop intelligent leak detection system through Hilbert-Huang Transform (HHT) analysis, the selection for IMF must be automated and self-decision making process through the system. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Passive forward scatter radar based on LTE signal for vehicle detection and classification by Abdul Aziz, Noor Hafizah

    Published 2018
    “…This thesis clarifies in details the LTE based passive forward scatter radar receiver circuit, the detection scheme and the classification algorithm. …”
    Get full text
    Get full text
    Thesis