Search Results - (( java implementation phase algorithm ) OR ( using detection a algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
- using detection »
- detection a »
- a algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
4
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Modified Binary Grey Wolf Optimiser (MBGWO) is a modern metaheuristic algorithm that has successfully been used for FS for anomaly detection. …”
Get full text
Get full text
Thesis -
5
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
Get full text
Get full text
Thesis -
6
Evaluation of feature selection algorithm for android malware detection
Published 2018“…MTF-IDF proved either using various kinds of feature or various kinds of dataset size, algorithm still effective for Android malware detection. …”
Get full text
Article -
7
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
Get full text
Get full text
Thesis -
8
Fire Detection Algorithm using Image Processing Techniques
Published 2015“…The algorithm uses RGB colour model to detect the colour of the fire which is mainly comprehended by the intensity of the component R which is red colour. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
10
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
Get full text
Get full text
Thesis -
11
Machine learning algorithms in context of intrusion detection
Published 2016“…These machine learning algorithms develop a detection model in a training phase. …”
Get full text
Get full text
Conference or Workshop Item -
12
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
Get full text
Get full text
Get full text
Article -
15
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…Next, a full tree is constructed per group using the LSBs of its pixels. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
17
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
18
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
Get full text
Get full text
Thesis -
19
A novel algorithm to detect a QPSK signal with the minimum number of samples
Published 2015“…This paper presents a novel algorithm to detect a QPSK signal with the minimum number of samples, or as few as four samples per symbol. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…However, various luminance intensities are one of the major problems in the development of a drowsiness signs detection system. This research studies the suitable image processing techniques to be implemented in a drowsiness signs detection algorithm for various lighting conditions. …”
Get full text
Get full text
Get full text
Get full text
Thesis
