Search Results - (( java application modified algorithm ) OR ( using detection drops algorithm ))
Search alternatives:
- application modified »
- java application »
- using detection »
- detection drops »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…The second is RED (Random Early Detection), which drops incoming packets at a certain probability.…”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Performance study of large block forward error correction with random early detection queue policy
Published 2009“…In this paper, we report an investigation on performance of the forward error correction (FEC) with random early detection (RED) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while RED is an active queue management algorithm. …”
Get full text
Get full text
Get full text
Book Section -
5
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…The results obtained were satisfying, where the algorithm were able to detect and remove the rain streaks without losing the aliveness of the scene. …”
Get full text
Get full text
Thesis -
6
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…In addition, it is also aimed to improve the resource consumption of the packet-based detection approach. CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
7
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014Get full text
Get full text
Final Year Project -
8
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014Get full text
Get full text
Final Year Project -
9
Automated traffic counting data collection and analysis
Published 2021“…However, the accuracy is dropped to 50% when the condition is dark. This is due to the system is unable to detect the vehicle in such condition.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
11
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Our study uses three well-known intrusion detection datasets: NSL-KDD, UNSW-NB15, and KDDCUP99. …”
Get full text
Get full text
Article -
12
Adaptive unified neural network for dynamic power quality compensation
Published 2013“…For compensating the fault, another controller plant is implemented that uses Levenberg-Marquardt backpropagation algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
14
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…In this report, the research on welding defect detection and classification using radiograph images is presented. …”
Get full text
Monograph -
15
Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease
Published 2024“…This aimed to optimize the Light Gradient-Boosting Machine (LightGBM) algorithm to enhance its performance and accuracy in the early detection of CHD, providing a reliable, cost-effective, and non-invasive diagnostic tool. …”
Get full text
Get full text
Get full text
Article -
16
Performance enhancement of DCCP TCP - like over long delay link networks
Published 2012“…Instead of halving the current congestion window when congestion events are detected, the reduction of current congestion window drop has been shown to improve the DCCP TCP-like throughput with minimal drop packet percentage.…”
Get full text
Get full text
Get full text
Article -
17
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Furthermore, it achieved approximately 50 Frames per Second (FPS) using a live camera, meeting the real-time detection requirements. …”
Get full text
Get full text
Thesis -
18
ACCURACY ENHANCEMENT OF OMR FOR EXAM MARKING WITHOUT PRE-SET TEMPLATE USING IMAGE PROCESSING
Published 2019“…However, studies so far have achieved relatively low accuracy and poor consistency unless a fixed OMR form design is used. Accuracy drops with more OMR questions. Therefore, this study investigate means to improve OMR marking accuracy using enhanced algorithm designed for OMR marking. …”
Get full text
Get full text
Final Year Project -
19
Improving robotic grasping system using deep learning approach
Published 2020“…This research aimed to develop a Deep Learning grasp detection model and a slip detection algorithm and integrating them into one innovative robotic grasping system. …”
Get full text
Get full text
Thesis -
20
Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.]
Published 2025“…In this paper, we experimentally determined the Machine Learning (ML) models that are most robust for use in indoor occupancy detection. This is important because the activities of human subjects in an ML environment are capable of disrupting the data available to some deployed ML models, which might cause the performance of such models to drop. …”
Get full text
Get full text
Get full text
Article
