Search Results - (( java application optimization algorithm ) OR ( using computer detection algorithm ))
Search alternatives:
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
-
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
7
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed of the detection engine used in SNORT-NIDS. …”
Get full text
Get full text
Thesis -
8
-
9
Signal detection algorithm for cognitive radio using singular value decomposition
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
Get full text
Get full text
Thesis -
11
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…The goal of intrusion detection is to discover unauthorized use of computer systems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
13
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
14
Immune Multi agent System for Network Intrusion Detection using Non- linear Classification Algorithm
Published 2010Get full text
Get full text
Citation Index Journal -
15
Fire Detection Algorithm using Image Processing Techniques
Published 2015Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021Get full text
Get full text
Get full text
Article -
18
Solving time gap problems through the optimization of detecting stepping stone algorithm
Published 2004Get full text
Get full text
Book Section -
19
Facial mask detection in low light environment
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
20
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph
