Search Results - (( java implication force algorithm ) OR ( rule detection device algorithm ))
Search alternatives:
- implication force »
- java implication »
- device algorithm »
- force algorithm »
- rule detection »
-
1
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…This experiment used real 3799 Android samples with 217 features and achieved the best accuracy rate of detection of more than 98% by using Unordered Fuzzy Rule Induction (FURIA).…”
Get full text
Get full text
Get full text
Article -
2
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…The employment of peak detection algorithm is prominent in several clinical applications such as diagnosis and treatment of epilepsy patients, assisting to determine patient syndrome, and guiding paralyzed patients to manage some devices. …”
Get full text
Get full text
Conference or Workshop Item -
4
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
5
Approach for detecting lane line boundaries / Mamadou Baldeh
Published 2020“…In this paper, previous vision based lane detection studies are reviewed in terms of three aspects, which are lane detection algorithms, integration, and evaluation methods. …”
Get full text
Get full text
Thesis -
6
Rule-Base Wearable Embedded Platform for Seizure Detection from Real EEG Data in Ambulatory State
Published 2014“…This paper describes a classification method is presented using an empirical Rule-base System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. …”
Get full text
Get full text
Conference or Workshop Item -
7
Rule-base wearable embedded platform for seizure detection from real EEG data in ambulatory state
Published 2014“…This paper describes a classification method is presented using an empirical Rule-base System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. …”
Get full text
Get full text
Conference or Workshop Item -
8
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
Published 2014Get full text
Get full text
Conference or Workshop Item -
9
-
10
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System
Published 2012“…High impedance fault (HIF) is abnormal event on electric power distribution feeder which does not draw enough fault current to be detected by conventional protective devices. The algorithm for HIF detection based on the amplitude ratio of second and odd harmonics to fundamental is presented. …”
Get full text
Get full text
Get full text
Article -
12
Shunt active power filter with modified synchronous reference frame technique and fuzzy logic current controller for harmonic mitigation
Published 2017“…From both results, the proposed algorithms show good performances when compared with the conventional algorithms. …”
Get full text
Get full text
Thesis -
13
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…Finally, a set of experiments to validate the proposed algorithms has been conducted. The algorithms function with success rate from 74% up to 100% and could handle the orientation of a tilted object up to 45 degrees. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Comparison between fuzzy and non-fuzzy classification methods in the prediction of residential household water leakage / Nor Aishah Md Noh, Dr. Khairul Anwar Rasmani and Nur Rasyid...
Published 2013“…The aim of this research is to predict residential households water leakage using models created based on training data with fuzzy rule-based and non-fuzzy rule-based algorithms available in WEKA Machine Learning Software (Witten and Frank, 2005). …”
Get full text
Get full text
Research Reports -
15
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various malicious activities. …”
Get full text
Get full text
Article -
16
A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction
Published 2013“…The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
Get full text
Get full text
Conference or Workshop Item -
17
Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60
Published 2009“…These algorithms are often tested and applied on PC. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Portable Stress Detection System for Autistic Children Using Fuzzy Logic
Published 2024journal::journal article -
19
Enhancing navigation for the visually impaired: a Mamdani type 1 fuzzy logic approach to obstacle detection
Published 2025“…Most previous research has focused on image detection algorithms for assistive devices, but they are less reliable in poor visibility and sensitive to environmental conditions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
Get full text
Get full text
Article
