Search Results - (( evolution information detection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method by Al-Mohair, Hani Kaid Saif

    Published 2017
    “…The Differential Evolution Algorithm (DE) is used in this work to select the optimum color and texture information to achieve the optimum response. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S.M.M Yassin, S.M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…To solve the problem, this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately. The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    An improved mobility state detection mechanism for femtocells in LTE networks by Maiwada, U.D., Usman Danyaro, K., Sarlan, A.B.

    Published 2022
    “…This research investigates energy efficiency for femtocell mobility state detection algorithms to increase the QoS in LTE and advanced LTE networks (5G/6G networks). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An improved mobility state detection mechanism for femtocells in LTE networks by Maiwada, U.D., Usman Danyaro, K., Sarlan, A.B.

    Published 2022
    “…This research investigates energy efficiency for femtocell mobility state detection algorithms to increase the QoS in LTE and advanced LTE networks (5G/6G networks). …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An improved mobility state detection mechanism for femtocells in LTE networks by Maiwada, U.D., Usman Danyaro, K., Sarlan, A.B.

    Published 2022
    “…This research investigates energy efficiency for femtocell mobility state detection algorithms to increase the QoS in LTE and advanced LTE networks (5G/6G networks). …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Audio files comparator using wavelet transform and similarity metrics by Lee, Da Long

    Published 2025
    “…Despite these variations, the tunes or pitches of songs remain recognizable to the human ear and even audio detection algorithms. With the proliferation of digital music, people download songs from music applications or the internet, whether for personal listening in vehicles or to play in parties. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection by Al-Shanoon, Abdulrahman Abdulkareem Sattoori

    Published 2016
    “…The robotic hand system comprises a new algorithm for data extraction and signal processing analysis that are measured from an object re-gripping operation based on slip detection information. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A novel approach based on machine learning and public engagement to predict water-scarcity risk in urban areas by Hanoon, Sadeq Khaleefah, Abdullah, Ahmad Fikri, M. Shafri, Helmi Z., Wayayok, Aimrun

    Published 2022
    “…The five algorithms that were used in this work indicated that diagnosing WSR using PP achieved good-to-perfect accuracy. …”
    Get full text
    Get full text
    Article
  20. 20

    Geospatial Based Application for Dam Planning and Monitoring in Malaysia: A Review by Deros S.N.M., Jalal K.A., Ishak N.A., Din N.M., Naim M.R.

    Published 2024
    “…This is enhanced by the evolution of algorithms and models that will induce efficient monitoring at a wider coverage area. � The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023.…”
    Book chapter