Search Results - (( usage detection system algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- system algorithm »
- java application »
- usage detection »
-
1
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. …”
Get full text
Get full text
Final Year Project -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
-
6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
7
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Previous study by Leong show the useful of CAD system but her study is not fully automated. Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
8
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…This indicates that highest detection accuracy, high throughput performance and lowest detection time (i.e., fast detection) can effectively be achieved by RMD algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Development Of Control Algorithm For Spot Cooling System
Published 2017“…This project’s aim is to develop a Control Algorithm for Spot Cooling system. The system helps to detect and track a non-human decoy. …”
Get full text
Get full text
Monograph -
10
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
Published 2023“…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
Article -
11
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
Get full text
Get full text
Article -
12
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Internet security requirements are increasing due to the growth of internet usage. One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). …”
Get full text
Get full text
Get full text
Article -
14
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
Get full text
Thesis -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
17
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…The usage of android system is rapidly growing in mobile devices. …”
Get full text
Get full text
Get full text
Article -
18
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
19
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
20
