Search Results - (( usage detection using algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The project proposed a dynamic analysis technique in Android malware detection. The objectives of the project are to investigate the Android malware using dynamic analysis technique and to enhance the accuracy of malware detection. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9
  10. 10

    Enhancing counterfeit tag detection for RFID system using slotted aloha by Musa, Yusuf

    Published 2021
    “…This indicates that highest detection accuracy, high throughput performance and lowest detection time (i.e., fast detection) can effectively be achieved by RMD algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Development Of Control Algorithm For Spot Cooling System by Andy, Tan Wei Keat

    Published 2017
    “…The detection result was verified using a graphical user interface (GUI) software running on a computer. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Diabetic Retinopathy Detection Model using Hybrid of U-Net and Vision Transformer Algorithms by Mudit, Khater

    Published 2024
    “…The total integration offers a robust model which helps in detecting various stages of diabetic retinopathy. We leverage the use of U-Net algorithm in image segmentation process to delineate the regions of interest in retinal images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm by Mohd. Zin, Zalhan

    Published 2007
    “…Often some of these features are irrelevant and do not contribute directly to the face detection techniques. This creates unnecessary computation and usage of large memory space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
    Get full text
    Get full text
    Article
  19. 19

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
    Get full text
    Get full text
    Article
  20. 20

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…Therefore, the proposed trilateration algorithm if implemented will detect and reduce the risk of unauthorized network access in tertiary institutions and save the danger of financial loss. …”
    Get full text
    Get full text
    Book Section