Search Results - (( java detection method algorithm ) OR ( problem application sensor algorithm ))

Refine Results
  1. 1

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Singular Value Thresholding Algorithm for Wireless Sensor Network Localization by Najib, Yasmeen Nadhirah Ahmad, Daud, Hanita, Abd Aziz, Azrina

    Published 2020
    “…Since the location of the sensors is one of the most interesting issues in WSN, the process of node localization is crucial for any WSN-based applications. …”
    Get full text
    Article
  6. 6

    Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network by Husna, Jamal Abdul Nasir

    Published 2020
    “…In Wireless Sensor Network (WSN), high transmission time occurs when search agent focuses on the same sensor nodes, while local optima problem happens when agent gets trapped in a blind alley during searching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…Furthermore, all analysis and evaluation attributes indicate that the MOGA-AMPazy deployment algorithm can handle the multi-objective underwater sensor deployment problem better than other solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A survey of state of the art: hierarchical routing algorithms for wireless sensor networks by Kareem, Husam, Hashim, Shaiful Jahari, Sali, Aduwati, Subramaniam, Shamala

    Published 2014
    “…Wireless sensor networks can be used in wide range of applications such as measuring temperature, humidity, pressure, noise level, monitoring the vehicular movement, military applications and health applications. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improved GbLN-PSO Algorithm for indoor localization in wireless sensor network by M. Shahkhir, Mozamir, Rohani, Abu Bakar, Wan Isni Soffiah, Wan Din, Zalili, Musa

    Published 2021
    “…Localization is one of the important matters for Wireless Sensor Networks (WSN) because various applications are depending on exact sensor nodes position. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…By merging wireless sensor nodes with mobile robots, the performance of wireless sensor network applications may be improved. …”
    Get full text
    Get full text
    Thesis
  14. 14

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…Wireless sensor networks (WSN) has applications in many areas such as in surveillance, healthcare, national security, military and environmental monitoring. …”
    Article
  15. 15

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…Furthermore, all analysis and evaluation attributes indicate that the MOGA-AMPazy deployment algorithm can handle the multi-objective underwater sensor deployment problem better than other solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2018
    “…In addition, to ensure the robustness of SKF algorithm, the algorithm is tested under vision problems, occlusion and illumination-invariant. …”
    Get full text
    Get full text
    Thesis