Search Results - (( knowledge detection techniques algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- detection techniques »
- knowledge detection »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
4
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
5
Norms detection and assimilation in multi-agent systems: a conceptual approach
Published 2012Get full text
Book Section -
6
Evaluation of facial detection using adaboost and morphology / Maisarah Aripin
Published 2007“…Each of those techniques has its own effectiveness in face detection, For example knowledge based method that able to work well for face localization in uncluttered background. …”
Get full text
Get full text
Thesis -
7
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
8
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
9
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
10
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
11
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
12
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
13
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…At the same time, it provides a clear insight into the techniques developed for anomaly detection problems. …”
Get full text
Get full text
Article -
14
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
15
Improving intrusion detection using genetic algorithm
Published 2013“…The experimental results demonstrate that the proposed approach outperforms the existing techniques, with the detection rate of attack and false alarm rates of 95.7265 and 4.2735, respectively. …”
Get full text
Get full text
Get full text
Article -
16
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…Based on the selected features, three predictive modeling techniques (J48, DTNB and Naive Bayes) were applied for dengue outbreak detection. …”
Get full text
Get full text
Get full text
Article -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Therefore, jammer attack detection and classification, studies were provided with better knowledge and technology to develop more robust defence techniques.…”
Get full text
Get full text
Thesis -
18
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
19
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section
