Search Results - (( program implementation using algorithm ) OR ( data detection method algorithm ))
Search alternatives:
- program implementation »
- implementation using »
- method algorithm »
- using algorithm »
- data detection »
-
1
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The highest accuracy is 78.33% ofthe 10-fold Cross Validation method are found in data is 80% training and 20% testing when k is equal to 5. …”
Get full text
Get full text
Thesis -
2
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The purpose of this study is to apply the K-Means algorithm to perform clustering on COVID-19 data to determine the high spread of the virus in regions in Indonesia based on the frequency of the data. …”
Get full text
Get full text
Book Section -
3
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The shortest distance is defined as best result. A set of data contains position of marbles is tested for ACO algorithm in the prototype. …”
Get full text
Get full text
Thesis -
4
-
5
Cyclic redundancy encoder for error detection in communication channels
Published 2004“…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Fuzzy speed controller for DC motor drives
Published 2013“…Clanguage programming will be used as assemble language for programming and develop the algorithm and interface.…”
Get full text
Get full text
Undergraduates Project Papers -
7
Performance comparison of various YOLO architectures on object detection of UAV images
Published 2022“…Current Unmanned Aerial Vehicles (UAVs) applications in transportation systems encourage the development of object detection methods to collect real-time traffic data using UAVs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Image processing on intel edison microcontroller for pork detection
Published 2016“…Moreover, the proposed method is cost effective, and it can be used anytime since it is based on digital data. …”
Get full text
Get full text
Thesis -
9
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…Materials and Methods: We used hyperspectral reflectance data from healthy and FLS of soybeans. …”
Get full text
Get full text
Get full text
Article -
10
Self routing traffic light for traffic light controller using priority method based on volume of vehicles
Published 2015“…In order to increase and enhance the efficiency and accuracy of real time traffic flow, this thesis proposes a novel implementation of sensing method called Self-Routing Traffic Light (SRTL) which incorporates a self-algorithm program as a practical solution to reduce traffic congestion. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
14
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
18
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
19
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
20
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis
