Search Results - (( initial detection system algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid. by Abdul Khalid, Noor Elaiza

    Published 2010
    “…FPSO incorporates fuzzy edge detection technique as the initial population and the optimum membership value as the fitness function in the particle swarm optimization algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of vehicle detection and counting system for traffic analysis using computer vision by Saw, Kenny Wei Wen

    Published 2024
    “…In traffic analysis, a real-time vehicle detection and counting system is definitely important, as existing systems only provide the ability to detect or count, but not all of them. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas by Md Jelas, Imran

    Published 2022
    “…Later, Long Short-Term Memory (LSTM) artificial neural network (ANN) is proposed as training algorithm in training module and prediction algorithm in detection module to be used for the development of the actual system based on this proposed framework initiative. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Resource utilization is optimized, and the total number of clock cycles required is found to be 15 initially, in addition to one clock cycle per member of algorithm population. …”
    Get full text
    Get full text
    Article
  14. 14

    A simplified sphere decoding algorithm for MIMO transmission system by Noordin, Nor Kamariah, Mohd Ali, Borhanuddin, Jamuar, Sudhanshu Shekhar, Ismail, Mahamod

    Published 2005
    “…In Chan-Lee sphere decoding -based algorithm, the problem of choosing initial radius has been solved by making the radius sufficiently large, thus increasing the size of the search region. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…Next, the system will invoke the person detection module using YOLO every 1 second to detect the presence of human. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A Fast Vertical Edge Detection Algorithm for Car License Plate Detection by Ali Al-Ghaili, Abbas Mohammed

    Published 2009
    “…Recently, License Plate Detection (LPD) has been used in many applications especially in transportation systems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…For the past few years, drowsiness signs detection systems have been developed as one of the initiative to reduce car crashes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
    Get full text
    Get full text
    Thesis