Search Results - (( simulation activation detection algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- simulation activation »
- activation detection »
- application testing »
- testing algorithm »
- java application »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Web Camera Application For Motion Detection
Published 2003“…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
4
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
5
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023“…The system is modeled and simulated using MATLAB/Simulink simulation package with a shunt active power filter to compensate for the harmonics current injected by the loads. …”
Conference paper -
6
Broken Conductor Detection on Power Distribution Feeder
Published 2013“…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms
Published 2024“…This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. …”
Article -
9
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Novel voice activity detection based on cepstrum moments
Published 2010“…Statistical methods for voice activity detection (VAD) have shown impressive performance especially with respect to their ability to be tuned parametrically and adoptability with deferent environments. …”
Get full text
Get full text
Conference or Workshop Item -
11
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
-
13
Combination of GREEN and SHRed AQM for short-lived traffic
Published 2008“…To evaluate the performance of new algorithm, network simulation has been done using NS-2 simulation.This study provides a series of NS-2 experiments to investigate the behavior of new algorithm.The results show improvement on short-lived traffic.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model
Published 2013“…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Botnet detection using automated script / Norfathin Rosli
Published 2020“…Nowadays, as we know the virus or malware spread can be so fast and usually hard to detect. This simulation is to detect the Botnet presence and identifying its behaviour. …”
Get full text
Get full text
Thesis -
18
Embedded wearable EEG seizure detection in ambulatory state
Published 2014“…The wearable devices allow the user to continue daily activities while being monitored for seizure activities. …”
Get full text
Get full text
Article -
19
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…The performance of the system is shown under various conditions of daily activities. In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
Get full text
Get full text
Conference or Workshop Item -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
