Search Results - (( processes activation detection algorithm ) OR ( java application optimized algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8
  9. 9

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  12. 12

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…The abnormal PPG pattern detection using rule-based algorithm has produced accuracy of 87.30% in training process and 87.18% in testing process with coverage of rule for training and testing, 89.26% and 87.33%. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14
  15. 15

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Improving The Algorithm To Detect Internet Worms by Rasheed, Mohmmad M

    Published 2008
    “…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Investigating the performance of an amplitude-independent algorithm for detecting the hand muscle activity of stroke survivors by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…The results showed that the amplitude-independent algorithm performed better in terms of detecting weak muscle activity and resisting false alarms.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  20. 20