Search Results - (( java application optimization algorithm ) OR ( knowledge detection techniques algorithm ))
Search alternatives:
- application optimization »
- detection techniques »
- knowledge detection »
- java application »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
-
5
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
9
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
10
Norms detection and assimilation in multi-agent systems: a conceptual approach
Published 2012Get full text
Book Section -
11
Evaluation of facial detection using adaboost and morphology / Maisarah Aripin
Published 2007“…Each of those techniques has its own effectiveness in face detection, For example knowledge based method that able to work well for face localization in uncluttered background. …”
Get full text
Get full text
Thesis -
12
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
13
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
14
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
15
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
16
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
17
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
18
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
19
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
20
Improving intrusion detection using genetic algorithm
Published 2013“…The experimental results demonstrate that the proposed approach outperforms the existing techniques, with the detection rate of attack and false alarm rates of 95.7265 and 4.2735, respectively. …”
Get full text
Get full text
Get full text
Article
