Search Results - (( module detection system algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Robust watermarking using hand gesture for enhanced authentication by Seng, W.C., Fong, L.L., Shing, N.L., Noudeh, S.A.H.

    Published 2011
    “…This biometric authentication system is divided into two modules, which are watermark embedding module and watermark detection module. …”
    Get full text
    Get full text
    Article
  5. 5

    Skin region detector for real time face detection system by Mohd Mustafah, Yasir, Azman, Amelia Wong

    Published 2012
    “…In the implementation, the region of interest is detected using two algorithms, running in parallel. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    FPGA implementation of CPFSK modulation techniques for HF data communication by Jaswar, Fitri Dewi, Sha'ameri, Ahmad Zuri

    Published 2003
    “…Further reduction in components is achieved hy adopting a multiplierless and parallel algorithm at the receiver module. This is proven by comparing with conventional noncoherent detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Advanced chirped spectral modulation technique and particle swarm optimization algorithms for effective indoor air pollution detection and monitoring by Shalaby A.M., Othman N.S., Shalaby M.

    Published 2025
    “…This research endeavors to pioneer a novel approach characterized by heightened sensitivity, even in the presence of unidentified elements in the air. In this work, PSO algorithm is used in conjunction with Chirped Spectral Modulation (CSM) technique to increase system sensitivity to detect small traces of harmful gases inside buildings and protect the environment through early detection of pollution. …”
    Article
  10. 10
  11. 11

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…Error-prone areas may be difficult to locate or recognise in a big solar photovoltaic module. A solar photovoltaic modules system can hide it until the whole system collapse or breakdown. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A framework for Malaysian Sign Language Recognition using deep learning initiatives / Imran Md Jelas by Md Jelas, Imran

    Published 2022
    “…Later, Long Short-Term Memory (LSTM) artificial neural network (ANN) is proposed as training algorithm in training module and prediction algorithm in detection module to be used for the development of the actual system based on this proposed framework initiative. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    System design for urban vehicle two-way connection monitoring system / Muhammad Haiqal Amiruddin by Amiruddin, Muhammad Haiqal

    Published 2015
    “…The monitoring system framework is divided into 3 modules: sensing, action and communication module. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
    Get full text
    Get full text
    Thesis
  16. 16

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  17. 17

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development Of Vehicle Tracking And Counting System From Traffic Surveillance Video by Kueh , Chiung Lin

    Published 2015
    “…The existing Vehicle Detection and Classification System does not have tracking and counting module implemented. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Intrusion detection system for the internet of things based on blockchain and multi-agent systems by Liang, Chao, Shanmugam, Bharanidharan, Azam, Sami, Karim, Asif, Islam, Ashraful, Zamani, Mazdak, Kavianpour, Sanaz, Idris, Norbik Bashah

    Published 2020
    “…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis