Search Results - (( java implication based algorithm ) OR ( user detection a algorithm ))
Search alternatives:
- implication based »
- java implication »
- user detection »
- detection a »
- a algorithm »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The proposed DetectCombined is an innovated technique that execute a protection code based on a sequence of three stages: filtration-validation-history, this technique produces a robust protection code that distinguish between safe SQL commands and malicious ones, and reinforce the memory of detection procedure by saving previous SQL attacks in special tables in the remote database, regardless of the types of users whether a general user of admin. …”
Get full text
Get full text
Get full text
Article -
2
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…The search for an effective nature-inspired optimization technique has certainly continued for decades. In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
3
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…In this project, it introduce to a mechanism to detect an e-mail. The main idea is to identify an e-mail that user feel suspicious about the content and originality. …”
Get full text
Get full text
Research Reports -
4
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…With the purpose of low SNR effect reduction, the expression is presented a novel Constant Local False Alarm Rate (CLFAR) with Constant Local Detection Rate (CLDR) algorithm, in which Secondary User (SU) can detect the licensed band in high noise variance medium accurately. …”
Get full text
Get full text
Thesis -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
Get full text
Get full text
Thesis -
6
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
Get full text
Get full text
Thesis -
7
Real time power quality event detection using continuous wavelet transform
Published 2023“…This paper shows continuous wavelet transform performs in real time is made possible and it is a promising signal processing algorithm for power quality event detection application. � 2011 IEEE.…”
Conference paper -
8
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
Get full text
Get full text
Article -
9
Development Of Control Algorithm For Spot Cooling System
Published 2017“…The detection result was verified using a graphical user interface (GUI) software running on a computer. …”
Get full text
Get full text
Monograph -
10
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…However, there is a lack of IoT development on face mask detection. …”
Get full text
Get full text
Get full text
Article -
11
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Monograph -
12
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…A user-friendly desktop prototype was developed, and users may upload handwritten samples and get immediate results for the dyslexia handwriting type (normal or reversal) and status of handwriting (detect or not detect). …”
Get full text
Get full text
Thesis -
13
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
Get full text
Monograph -
14
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…Cooperative spectrum sensing (CSS) in cognitive radio (CR) has been widely investigated to be considered as a spectrum scanning mechanism that allows secondary users or cognitive radio users (SUs) to use detected spectrum holes caused by primary users (PUs) absence. …”
Get full text
Get full text
Conference or Workshop Item -
15
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
16
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
Get full text
Get full text
Student Project -
17
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
Get full text
Get full text
Conference or Workshop Item -
18
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
19
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
20
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
