Search Results - (( java implication force algorithm ) OR ( process _ prevention algorithm ))

Refine Results
  1. 1

    Enhancement of stemming process for malay illicit web content by Noor Fatihah , Mazlam

    Published 2012
    “…To date, the existing stemming algorithm in Malay language; Othman’s stemming algorithm and Sembok’s stemming algorithm still produce errors in the result. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of a new algorithm for segmentation of flotation froth images by Jahedsaravani, Ali, Marhaban, Mohammad Hamiruce, Massinaei, Mohammad, Saripan, M. Iqbal, Mehrshad, Naser, Mohd Noor, Samsul Bahari

    Published 2014
    “…It is well known that froth visual features reflect the operating conditions of the flotation process, so that being able to accurately obtain the froth properties is the most significant criteria to optimize and control this process. …”
    Get full text
    Get full text
    Article
  6. 6

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, K. Subramaniam, Shamala

    Published 2011
    “…The results show that the two models successfully prevent both wireless DoS and replay attacks. In addition, the newly proposed M-hmac algorithm provides better network performance in term of the metrics.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…To solve this issue, an algorithm is proposed to automate the global CDN building process and at the same time obtain a balanced overall CDN not achieved by the conventional method. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Automatic control of flotation process using computer vision by Saravani, Ali Jahed

    Published 2015
    “…A marker based watershed algorithm had been adopted and improved so as to prevent the over segmentation of big bubbles and able to adapt itself with different scenario of froth images. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING by ONG KANG WEI, ONG KANG WEI, LOH SER LEE, LOH SER LEE

    Published 2022
    “…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    ASIC Layout Design-Space Exploration of Pan-and-Tompkins Pre-Processing Algorithm for High Efficiency Electrocardiogram Monitor by Jia, Hui Lim, Yuan, Wen Hau, Hoe, Tung Yew, Sreedharan Baskara Dass

    Published 2020
    “…Moreover, long hour ECG monitoring requires an efficient architecture to support real-time processing and low power consumption. This paper presents an application specific integrated circuit (ASIC) design of Pan-and-Tompkins ECG pre-processing algorithm which aims to remove several unwanted noise to increase analysis accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method by Delgoshaei, Aidin

    Published 2016
    “…It is observed that in 67% of studied cases, inflation rate can strengthen cell load variation. To prevent this event a new method is proposed using the statistical process control terms (SPC) which prevent allocating each machine type more than a dynamic upper limit of average of a machine type inside a cell. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Integration of spectroscopy and chemometric analysis for food authentication: a review by Basri, Katrul Nadia

    Published 2025
    “…The high demand in the food sector necessitates an authentication process to verify products and prevent food fraud. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article