Search Results - (( layer detection system algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    A low complexity multi-layered space frequency coding detection algorithm for MIMO-OFDM by Chong, Jin Hui, Ng, Chee Kyun, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin

    Published 2012
    “…A low complexity multi-layered space frequency OFDM (MLSF-OFDM) coding scheme is presented with the proposed two detection algorithms, fast QR decomposition detection algorithm or denoted as FAST-QR and enhanced FAST-QR (E-FAST-QR). …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Joint optimal detection of ordering SIC ZF and SIC ZF MAP for V-BLAST/STBC wireless communication systems by Chong, Jin Hui, Khatun, Sabira, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin, Syed Junid, Syed Mansor

    Published 2008
    “…Simulation results show the symbol error rate performance degradation of the proposed algorithm is small compared to SIC ZF MAP detection.…”
    Get full text
    Conference or Workshop Item
  3. 3

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Sphere detection analysis performance combined with the LDPC decoding / Xiao Peng and Satoshi Goto by Xiao, Peng, Satoshi, Goto

    Published 2011
    “…For LDPC codes, min-sum and layered decoding algorithms are discussed, and for MIMO detection, the maximum likelihood (ML) decision based on the sphere decoding algorithm is mainly analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain by Bahrain, Siti Nurul Izzah

    Published 2024
    “…Therefore, proving that the system can carry out the detection task may have emerged as a pivotal solution for detecting and mitigating face-spoofing attacks.…”
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11
  12. 12

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhanced android malware detection framework using API application framework layer by Abdul Ghani, Saidah Mastura

    Published 2023
    “…This thesis was to develop an enhanced framework to detect Android malware application using Application Framework layer components. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Intrusion detection system for the internet of things based on blockchain and multi-agent systems by Liang, Chao, Shanmugam, Bharanidharan, Azam, Sami, Karim, Asif, Islam, Ashraful, Zamani, Mazdak, Kavianpour, Sanaz, Idris, Norbik Bashah

    Published 2020
    “…The National security lab-knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…One form of implementation is intrusion detection system (IDS). In IDS, the main problem for nuisance network administrators in detecting attacks is false alerts. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals by Faradila, Naim, Mahfuzah, Mustafa, Norizam, Sulaiman, Zarith Liyana, Zahari

    Published 2022
    “…This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals by Faradila, Naim, Mahfuzah, Mustafa, Norizam, Sulaiman, Zarith Liyana, Zahari

    Published 2022
    “…This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Analytical redundancy based fault detection system generally requires an accurate model. …”
    Get full text
    Conference or Workshop Item