Search Results - (( java implementation bees algorithm ) OR ( basic complex detection algorithm ))

Refine Results
  1. 1
  2. 2

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…The design of SBD algorithms developed from simple feature comparison to rigorous probabilistic and using of complex models. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods by Ng, Ing Kye

    Published 2014
    “…The purpose of Gesture Estimation is to detect gestures and locates the screen coordinates. …”
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
    Get full text
    Get full text
    Thesis
  6. 6

    CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS by Adoum, Bakhit Amine Adoum

    Published 2011
    “…However, the basic idea is the same - the total bandwidth is sensed using coarse resolution energy detection, then, fine sensing is applied to the portion of interest. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of land target following system of hexacopter by Zakaria, Abdul Hafiz, Mohd Mustafah, Yasir, M. Hatta, Muhd. Mudzakkir, N. Azlan, Muhd. Nadzif

    Published 2015
    “…The future works include incorporating more complex image processing algorithms to get better target detection performance and more experiments on different real life situations.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Development of automated neighborhood pattern sensitive fault syndrome generator for SRAM by Rusli, Julie Roslita, Mohd Sidek, Roslina, Wan Hasan, Wan Zuha

    Published 2012
    “…With the increasing complexity of memory devices, fault diagnosis is becoming as important as fault detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…An approach that detects steady state value for calling genetic algorithm (GA) is proposed to overcome the problems of good classifiers deletion and the local minima trap. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing by Alsaadi, Alaa Abdullah Mohammed

    Published 2020
    “…The second main factor is a multipath fading channel which causes a delay in OFDM signal and results for Inter Symbol Interference Noise (ISI).Basically, phase noise is considered as main problem that causes significant degradation in detecting packet-based OFDM signals. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza by Ghulam , Murtaza

    Published 2021
    “…For BrC detection, an efficient and reliable model namely Ensemble BrC Detection Network (EBrC-Net) and three misclassification reduction (McR) algorithms are developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Performance optimization method in OFDM based on majorization and minimization technique by Al-Saadi, Alaa Abdullah, Latip, Rohaya, Muhammed, Abdullah

    Published 2019
    “…In this paper, we demonstrate and simulate a practical algorithm to mitigate phase noise which induces ICI .This algorithm is termed as Tight Quadratic Majorization (TQM) and is derived for phase noise estimation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Penglihatan Stereo Dalam Pengukuran Jarak by Kassim, Muhammad Hafiz

    Published 2006
    “…The operation of human vision became the basic technique on designing a number of range detection techniques such as binocular vision system or stereo vision system. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Optimal resource allocation for NOMA wireless networks by Albogamy, Fahad R., Aiyashi, M. A., Hashim, Fazirul Hisyam, Imran Khan, Choi, Bong Jun

    Published 2022
    “…Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC), are performed at the receiving end to demodulate the necessary user signals. …”
    Get full text
    Get full text
    Article
  19. 19

    Analysis of watermarking techniques in video by Shojanazeri, Hamid, Wan Adnan, Wan Azizun, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Saripan, M. Iqbal

    Published 2011
    “…Thus, research in copyright protection mechanisms, where one of which includes digital watermarking has been receiving an increasing interest from scientists especially in designing a seamless algorithm for effective implementation. Basically digital watermarking involves embedding secret symbols known as watermarks within video data which can be used later for copyright detection purposes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20