Search Results - (( dynamic detection method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat by Selamat, Nur Syuhada

    Published 2021
    “…It also caused many protections are developed to fight the malware. The most common method of detecting malware relies on signature-based detection. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…The noise reduction method in the proposed algorithm consists of a combination of a morphological filter and a rejection method. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Testing static single cell faults using static and dynamic data background by Zakaria, Nor Azura, Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Wen, Xiaoqing

    Published 2011
    “…Both static and dynamic DB transitions are used in order to detect Deceptive Read Destructive Faults (DRDFs) and Write Disturb Faults (WDFs) that are not detected by previous algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  13. 13

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The project proposed a dynamic analysis technique in Android malware detection. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15
  16. 16

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…This advantage is useful in systematically detect failures in process plant. Therefore, an algorithm for the development of process fault detection system in dynamic processes using artificial neural network (ANN) is presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Process monitoring and fault detection in nonlinear chemical process based on multi-scale Kernel Fisher discriminant analysis by Md Nor, Norazwan, Hussain, Mohd Azlan, Che Hassan, Che Rosmani

    Published 2015
    “…This approach is proposed for investigating the potential integration of wavelets and multi-scale methods with discriminant analysis in nonlinear chemical process monitoring and fault detection system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Continuous collision detection for virtual environments: A walkthrough of techniques by Sulaiman, Hamzah Asyrani, Bade, Abdullah

    Published 2011
    “…Continuous Collision Detection (CCD) has been widely accepted as the common tool to detect collision between dynamic collisions of rigid and deformable models, especially for use as an accurate collision method. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles by Muhammad Qasim, Khan, Musse Mohamud, Ahmed, Ahmed Mohamed, Ahmed Haidar

    Published 2022
    “…The aim is to allow accurate action-based performance for analysts in monitoring the transmission lines so that rapid actions can be taken during abnormal circumstances before the blackout occurs. Among different algorithms, this study focuses on modelling the non- recursive phasor estimation method in a power Simulink environment for a standard test system equipped with a developed algorithm to detect the fault zone. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article