Search Results - (( rate detection utilizing algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…Haar-classifier is utilized as the algorithms for this object detection system. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Analysis of artificial neural network and viola-jones algorithm based moving object detection by Rashidan, M. Ariff, Mohd Mustafah, Yasir, Zainal Abidin, Zulkifli, Zainuddin, N. Afiqah, A. Aziz, Nor Nadirah

    Published 2014
    “…The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2017
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Next, in the noise detection stage, in addition to the originally proposed intensity distance differential approach, the new method includes intensity height differential approach to reduce false detection rate. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2017
    “…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An FPGA based embedded vision system for real-time motion detection by AlDahoul, Nouar, Htike@Muhammad Yusof, Zaw Zaw

    Published 2015
    “…This results in a Gaussian Pyramid down sampling multi model sigma delta algorithm that gives low false detection error and good performance. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification by Juma, Sundus, Muda, Zaiton, Yassin, Warusia

    Published 2014
    “…Anomaly-based intrusion detection techniques, that utilize algorithms of machine learning, have the capability to recognize unpredicted malicious. …”
    Get full text
    Get full text
    Article
  16. 16

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…Results show that the proposed method is able to detect islanding conditions with 100% accuracy, 100% detection rate and 0% false alarm with detection time of less than 0.19s. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…Furthermore, the detection rate of the algorithm is improved by utilizing the proposed clustering procedure. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals by Ahmed, Ahmed Elsayed Elmahdy

    Published 2014
    “…This project aims at developing an automated epileptic seizure event detection algorithm. The proposed algorithm depends on using five features which are singular values, total power, delta band power, variance and mean. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
    Get full text
    Get full text
    Thesis