Search Results - (( pattern detection make algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- pattern detection »
- java application »
- detection make »
- make algorithm »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
-
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
7
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
8
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
10
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
11
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…To overcome the problem, the sensor needs to be trained for pre-calibrate and pre-process by developing a model of Artificial Neural Networks (ANN). The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. …”
Get full text
Get full text
Thesis -
12
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…To overcome the problem, the sensor needs to be trained for pre-calibrate and pre-process by developing a model of Artificial Neural Networks (ANN). The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. …”
Get full text
Get full text
Article -
13
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…For generating an interpretable deep architecture for identifying deep intrusion patterns, this study proposes an approach that combines ANFIS (Adaptive Network-based Fuzzy Inference System) and DT (Decision Tree) for interpreting the deep pattern of intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
Get full text
Get full text
Thesis -
15
-
16
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
17
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The algorithm enhances the recognition ability of the system compared to manual extraction and labeling of pattern classes. …”
Get full text
Get full text
Thesis -
18
-
19
A fuzzy logic control in adjustable autonomy of a multi-agent system for an automated elderly movement monitoring application
Published 2023“…Accident prevention; Assisted living; Computer circuits; Fuzzy logic; Multi agent systems; Adjustable autonomy; Ambient assisted living; Autonomous decision; Complex environments; Elderly remote care; Fall detection; Fuzzy logic control; Movement monitoring; Autonomous agents; aged; Article; automation; decision making; falling; fuzzy logic; human; movement (physiology); patient autonomy; patient monitoring; priority journal; algorithm; automated pattern recognition; computer simulation; movement (physiology); physiologic monitoring; procedures; theoretical model; Aged; Algorithms; Computer Simulation; Fuzzy Logic; Humans; Models, Theoretical; Monitoring, Physiologic; Movement; Pattern Recognition, Automated…”
Article -
20
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article
