Search Results - (( developing sharing detection algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1

    The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel by Jeoti , Varun

    Published 2010
    “…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Monkeypox disease detection using Convolutional Neural Network (CNN) / Nur Farhain Humaira Ghanami by Ghanami, Nur Farhain Humaira

    Published 2024
    “…The project is to study the CNN algorithm and develop a prototype to evaluate the accuracy of monkeypox disease detection using CNN. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…This project focuses on the development of the Student Resource Exchange, a web-based platform designed to enhance the sharing and accessibility of educational resources among students. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Energy and performance efficient resource allocation for cloud-based data centers by Akhter, Nasrin

    Published 2015
    “…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The increasing affordability of powerful processors and memory chips, availability of real-time operating systems, low complexity intelligent algorithms and the coming-of-age of system development software are the key factor that makes this development possible. …”
    Get full text
    Thesis
  11. 11

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…The images obtained from MIVIA dataset has been manually segmented to cell level from the image level. Developing an automated segmentation algorithm might give better results.…”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Improving malicious detection rate for Facebook application in OSN platform by Angamuthu, Laavanya

    Published 2018
    “…Our key contribution in this part is in developing malware detection in Facebook third party application by using Naïve Bayes algorithm technique .We identify a set of features that help us distinguish malicious apps from benign ones. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fakebuster: fake news detection system using logistic regression technique in machine learning by Mokhtar, Muhammad Syahmi, Jusoh, Yusmadi Yah, Admodisastro, Novia, Che Pa, Noraini, Amruddin, Amru Yusrin

    Published 2019
    “…In this study, Logistic Regression was applied in detecting fake news. Model development methodology is referenced and followed in this project. …”
    Get full text
    Get full text
    Article
  14. 14

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The findings of the study show that, there is a strong relationship between the summary writing proficiency of students and the summarizing strategies that they used. We then develop a new algorithm to address the summarizing strategies identification problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Embedded System Object Tracking Using Webcam by Yan, Ng Jia

    Published 2014
    “…The SimpleCV, an open source framework that provides free computer vision libraries that is useful for object detection and tracking algorithm development.…”
    Get full text
    Get full text
    Final Year Project
  16. 16

    AUTOMATED PLANT DISEASE DETECTION USING DEEP LEARNING ON MOBILE PLATFORM by Vera Ruth, Rewcastle

    Published 2019
    “…Therefore, this project aims at developing a mobile applicatiJ:;m which is equipped with deep learning algorithm to enable the detection and identification of a disease for a particular plant. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…Two approaches introduced to detect malware in Android mobile environment namely static analysis and dynamic analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Federated deep learning for automated detection of diabetic retinopathy by Zainal Abidin, Nadzurah, Ismail, Amelia Ritahani

    Published 2022
    “…Deep learning is a machine learning algorithm with potential for detecting the significance of DR. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Comparative analysis of deepfake image detection method using VGG16, VGG19 and ResNet50 by Ashani, Zahra Nazemi, Che Ilias, Iszuanie Syfidza, Ng, Keng Yap, Kamel Ariffin, Muhammad Rezal, Jarno, Ahmad Dahari, Zamri, Nor Zarina

    Published 2024
    “…By harnessing the power of AI, particularly through the application of CNN algorithms, this research makes a significant contribution to the field of deepfake image detection. …”
    Get full text
    Get full text
    Get full text
    Article