Search Results - (( java application customization algorithm ) OR ( a detection method algorithm ))

Refine Results
  1. 1

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Lastly, this method can reduce a high false positive alarm rate and misclassification for detecting process.…”
    Get full text
    Get full text
    Thesis
  4. 4

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…The objective of this paper is to study and make a comparison among the available intrusion detections algorithms and methods in the intrusion detections. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Obfuscated Malware Detection: Impacts on Detection Methods by Gorment N.Z., Selamat A., Krejcar O.

    Published 2024
    “…This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. …”
    Conference Paper
  8. 8

    Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images by Elaraby, Ahmed, Al-Ameen, Zohair

    Published 2022
    “…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
    Get full text
    Get full text
    Article
  9. 9

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…These machine learning algorithms develop a detection model in a training phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Improving the efficiency of clustering algorithm for duplicates detection by Emran, Nurul Akmar, Abdul Rahim, Abdulrazzak Ali Mohamed, Kamal Baharin, Safiza Suhana, Othman, Zahriah, Salem, Awsan Thabet, Abd Aziz, Maslita, Md. Bohari, Nor Mas Aina, Abdullah, Noraswaliza

    Published 2023
    “…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study by Khalid Hameed, Husamuldeen, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2020
    “…Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Lastly, this method can reduce a high false positive alarm rate and misclassification for detecting process.…”
    Get full text
    Monograph
  13. 13
  14. 14

    A Fast Vertical Edge Detection Algorithm for Car License Plate Detection by Ali Al-Ghaili, Abbas Mohammed

    Published 2009
    “…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…This thesis focuses on a method to recognize and detect a human at the surveillance or highlighted area boundary based their head beside; a simulation system of head detection was developed using image processing. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…This thesis focuses on a method to recognize and detect a human at the surveillance or highlighted area boundary based their head beside; a simulation system of head detection was developed using image processing. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A semi-synchronous label propagation algorithm with constraints for community detection in complex networks by Chin, J.H., Ratnavelu, K.

    Published 2017
    “…Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis