Search Results - (( layer detection method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms by Abd Manap, Nurulfajar, Soraghan, John J.

    Published 2012
    “…This method will be known as the Depth Layer Refinement (DLR) that using the disparity depth layers to refine the disparity map.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals by Faradila, Naim, Mahfuzah, Mustafa, Norizam, Sulaiman, Zarith Liyana, Zahari

    Published 2022
    “…Hence, a simplified feature selection method is necessary. This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals by Faradila, Naim, Mahfuzah, Mustafa, Norizam, Sulaiman, Zarith Liyana, Zahari

    Published 2022
    “…Hence, a simplified feature selection method is necessary. This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Sphere detection analysis performance combined with the LDPC decoding / Xiao Peng and Satoshi Goto by Xiao, Peng, Satoshi, Goto

    Published 2011
    “…For LDPC codes, min-sum and layered decoding algorithms are discussed, and for MIMO detection, the maximum likelihood (ML) decision based on the sphere decoding algorithm is mainly analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A new intelligent multilayer framework for insider threat detection by Ahmad, Rabiah, Al-Mhiqani, Mohammed Nasser Ahmed, Zainal Abidin, Zaheera, Abdulkareem, Karrar Hameed, Mohammed, Mazin Abed, Gupta, Deepak K., Shankar K.

    Published 2021
    “…The selection procedure has been developed based on the integration of the entropy-VIKOR methods. For the second layer, a hybrid insider threat detection method has been proposed, where the Misuse Insider Threat Detection (MITD) model has been created using the random forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  13. 13

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  14. 14

    Process fault detection using hierarchical artificial neural network diagnostic strategy by Othman, Mahamad Rizza, Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2007
    “…This paper focuses on the use of artificial neural network (ANN) to detect and diagnose fault in process plant. In this work, the ANN uses two layers of hierarchical diagnostic strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…There is a total of 198 voes detected and methods for selecting features are used to determine which VOCs are suitable for classifying human odour. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, robot navigation was implemented using packages provided by Nav2. The voxel layer in the layered cost map provided in Nav2 was utilized to detect the 3D obstacles that cannot be detected by 2D LiDAR. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Process Fault Detection Using Hierarchical Artificial Neural Network Diagnostic Strategy by Mohamad Rizza, Othman, Mohamad Wijayanuddin, Ali, Mohd Zaki, Kamsah

    Published 2007
    “…This paper focuses on the use of artificial neural network (ANN) to detect and diagnose fault in process plant. In this work, the ANN uses two layers of hierarchical diagnostic strategy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Distributed Denial of Service detection using hybrid machine learning technique by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
    Get full text
    Conference or Workshop Item
  20. 20

    Edge detection of MRI images using artificial neural network by Gunawan, Teddy Surya, Kartiwi, Mira, Abdul Malik, Noreha

    Published 2017
    “…Discussion The proposed ANN based edge detection produce better image segmentation for MRI images compared to other traditional edge detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article