Search Results - (( java application optimisation algorithm ) OR ( knowledge detection techniques algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Evaluation of facial detection using adaboost and morphology / Maisarah Aripin by Aripin, Maisarah

    Published 2007
    “…Each of those techniques has its own effectiveness in face detection, For example knowledge based method that able to work well for face localization in uncluttered background. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
    Get full text
    Get full text
    Article
  10. 10

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
    Get full text
    Get full text
    Article
  11. 11

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Ismail, Saidatul Akmar, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
    Get full text
    Get full text
    Article
  12. 12

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
    Get full text
    Get full text
    Article
  13. 13

    A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data by Suboh, Syahirah, Abdul Aziz, Izzatdin, Shaharudin, Shazlyn Milleana, Akmar Ismail, Saidatul, Mahdin, Hairulnizam

    Published 2023
    “…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
    Get full text
    Get full text
    Article
  14. 14

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…The experimental results demonstrate that the proposed approach outperforms the existing techniques, with the detection rate of attack and false alarm rates of 95.7265 and 4.2735, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Feature selection algorithms for Malaysian dengue outbreak detection model by Husam I.S. Abuhamad, Azuraliza Abu Bakar, Suhaila Zainudin, Mazura Sahani, Zainudin Mohd Ali

    Published 2017
    “…Based on the selected features, three predictive modeling techniques (J48, DTNB and Naive Bayes) were applied for dengue outbreak detection. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Therefore, jammer attack detection and classification, studies were provided with better knowledge and technology to develop more robust defence techniques.…”
    Get full text
    Get full text
    Thesis
  18. 18

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20