Search Results - (( solution negative detection algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…Based on these results, future research should focus on enhancing the core algorithm to be more resilient to variable lighting and distance, thereby reducing false positives and negatives. …”
    Get full text
    Get full text
    Article
  4. 4

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…This project attempts to accurately detect the type of dyslexic handwriting. Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The solution integrates a Telegram bot for streamlined communication, utilizing PiCamera to capture facial photos and promptly detect signs of drowsiness. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The solution integrates a Telegram bot for streamlined communication, utilizing Pi Camera to capture facial photos and promptly detect signs of drowsiness. …”
    Get full text
    Get full text
    Book Section
  9. 9

    Smart Digital Signage With Eye Tracking System by Chung , Soon Zhi

    Published 2017
    “…A sanity checking algorithm is proposed to filter out the wrong detected eyes and improve the overall detection rate. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…However, such detection method still lacks in differentiate the malware behaviours and cause the rate of falsely identified rate, i.e., false positive and false negative increased. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection by Mazaheri, Amin

    Published 2018
    “…With the advancement of integrated technology, in-situ electrochemical systems provide feasible solution for sensitive detection and miniaturized platform. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…The effectiveness of the IADS has been evaluated under different detection capabilities (i.e., false positive, false negative, true positive, true negative, false alarm, accuracy,detection rate, attack data detection rate, normal data detection rate) and detection times using the DARPA 1999 and ISCX 2012 intrusion detection benchmark datasets as well as with Live-data. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Coordinated Malware Eradication And Remediation Project (CMERP) by Abdollah, Mohd Faizal, S.M.M Yassin, S.M.Warusia Mohamed, Mas’ud, Mohd Zaki, Selamat, Siti Rahayu, Yusof, Robiah, Ahmad, Rabiah, Shahrin @ Sahibuddin, Shahrin

    Published 2019
    “…However, such detection method still lack in differentiate the malwares behaviours and cause the rate of falsely identified rate i.e. false positive and false negative increased. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  14. 14

    Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images by Boroujeni, Farsad Zamani, O. K. Rahmat, Rahmita Wirza, Mustapha, Norwati, Affendey, Lilly Suriani, Maskon, Oteh

    Published 2011
    “…The conventional seed point selection algorithms either rely merely on signal-to-noise ratio analysis, which results in a large number of false traces, or impose a set of strict geometrical validation rules that lead to more false negatives and require more computation time. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…Bilateral Horizontal Impulse (BHI) detection algorithm is introduced to detect the positive and negative impulsive force captured from yaxis of accelerometer. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study by Daru, April Firman, Hirzan, Alauddin Maulana, Mahmod Attar Bashi, Zainab Senan, Fanani, Fajriannoor

    Published 2025
    “…The agent with E-0.9 performed the poorest, with only 20,850 correct classifications and a negative cumulative reward of -714,035. The findings indicate that the proposed self-learning model based on Q-Learning can effectively identify network intrusions without requiring manual retraining, thereby offering a scalable and adaptive solution for real-time intrusion detection.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation by Noor Zaihan, Jamal

    Published 2019
    “…The simulation results from this study has established that GWO is able to produce promising solutions by generating the lowest operating time among other reviewed algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20