Search Results - (( java implication based algorithm ) OR ( user detection techniques algorithm ))
Search alternatives:
- detection techniques »
- implication based »
- java implication »
- user detection »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
2
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
Get full text
Get full text
Thesis -
3
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…The search for an effective nature-inspired optimization technique has certainly continued for decades. In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
4
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
5
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
6
On the energy detection performance based Welch's DCT algorithm in cognitive radio systems
Published 2018“…The results of the proposed technique proved that its performance is better than the conventional Welch's algorithm for both cases of low SNR and multi user terminals.…”
Get full text
Get full text
Conference or Workshop Item -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
Get full text
Get full text
Thesis -
9
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
10
Development Of Control Algorithm For Spot Cooling System
Published 2017“…This project’s aim is to develop a Control Algorithm for Spot Cooling system. The system helps to detect and track a non-human decoy. …”
Get full text
Get full text
Monograph -
11
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
12
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…A user-friendly desktop prototype was developed, and users may upload handwritten samples and get immediate results for the dyslexia handwriting type (normal or reversal) and status of handwriting (detect or not detect). …”
Get full text
Get full text
Thesis -
13
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
14
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
15
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
Get full text
Get full text
Get full text
Article -
16
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
17
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
Get full text
Get full text
Article -
18
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…The new technique can be used to detect the aforementioned biometric traits using the same feature extraction algorithm at limited time, since each biometric trait’s dimensions was drastically reduced. …”
Get full text
Get full text
Article -
19
-
20
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…Several spectrum sensing techniques are found in the literature. Few examples are energy detection, cyclostationary detection, matched filter detection, etc. …”
Get full text
Get full text
Get full text
Thesis
