Search Results - (( layer detection system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- system algorithm »
- java application »
- layer detection »
- using algorithm »
-
1
A low complexity multi-layered space frequency coding detection algorithm for MIMO-OFDM
Published 2012“…A low complexity multi-layered space frequency OFDM (MLSF-OFDM) coding scheme is presented with the proposed two detection algorithms, fast QR decomposition detection algorithm or denoted as FAST-QR and enhanced FAST-QR (E-FAST-QR). …”
Get full text
Get full text
Conference or Workshop Item -
2
Joint optimal detection of ordering SIC ZF and SIC ZF MAP for V-BLAST/STBC wireless communication systems
Published 2008“…Simulation results show the symbol error rate performance degradation of the proposed algorithm is small compared to SIC ZF MAP detection.…”
Get full text
Conference or Workshop Item -
3
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
4
Sphere detection analysis performance combined with the LDPC decoding / Xiao Peng and Satoshi Goto
Published 2011“…For LDPC codes, min-sum and layered decoding algorithms are discussed, and for MIMO detection, the maximum likelihood (ML) decision based on the sphere decoding algorithm is mainly analyzed. …”
Get full text
Get full text
Get full text
Article -
5
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…Therefore, proving that the system can carry out the detection task may have emerged as a pivotal solution for detecting and mitigating face-spoofing attacks.…”
Get full text
Get full text
Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
13
Enhanced android malware detection framework using API application framework layer
Published 2023“…This thesis was to develop an enhanced framework to detect Android malware application using Application Framework layer components. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…The National security lab-knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…One form of implementation is intrusion detection system (IDS). In IDS, the main problem for nuisance network administrators in detecting attacks is false alerts. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals
Published 2022“…This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
Get full text
Get full text
Get full text
Article -
18
Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals
Published 2022“…This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…Analytical redundancy based fault detection system generally requires an accurate model. …”
Get full text
Conference or Workshop Item
