Search Results - (( usage detection system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- system algorithm »
- java application »
- usage detection »
- using algorithm »
-
1
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. …”
Get full text
Get full text
Final Year Project -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Previous study by Leong show the useful of CAD system but her study is not fully automated. Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
4
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…This indicates that highest detection accuracy, high throughput performance and lowest detection time (i.e., fast detection) can effectively be achieved by RMD algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Development Of Control Algorithm For Spot Cooling System
Published 2017“…This project’s aim is to develop a Control Algorithm for Spot Cooling system. The system helps to detect and track a non-human decoy. …”
Get full text
Get full text
Monograph -
8
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
Published 2023“…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
Article -
9
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
Get full text
Get full text
Article -
10
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Internet security requirements are increasing due to the growth of internet usage. One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). …”
Get full text
Get full text
Get full text
Article -
12
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
Get full text
Thesis -
14
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…The usage of android system is rapidly growing in mobile devices. …”
Get full text
Get full text
Get full text
Article -
15
Study of machine learning in computer vision using Raspberry Pi
Published 2024text::Final Year Project -
16
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
17
-
18
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…Often some of these features are irrelevant and do not contribute directly to the face detection techniques. This creates unnecessary computation and usage of large memory space. …”
Get full text
Get full text
Get full text
Thesis -
19
Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain
Published 2020“…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
Get full text
Get full text
Thesis -
20
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The proposed project will extract the features of system calls, network packets, CPU usage and battery usage of the application. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
