Search Results - (( user detection a algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The user’s requirements will be collected using a quantitative questionnaire online surveying tool. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat by Assaig, Faisal Ahmed, Gunawan, Teddy Surya, Nordin, Anis Nurashikin, Ab Rahim, Rosminazuin, Mohd Zain, Zainiharyati

    Published 2023
    “…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9

    Robust multi-user detection based on hybrid grey wolf optimization by Ji, Yuanfa, Fan, Z ., Sun, X., Wang, S., Yan, S., Wu, S., Fu, Q., Kamarul Hawari, Ghazali

    Published 2020
    “…The search for an effective nature-inspired optimization technique has certainly continued for decades. In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.] by Buja, Al Ya@Geogiana, Ahmad, Illiasaak, Zolkeply, Mohd Syafiq

    Published 2014
    “…In this project, it introduce to a mechanism to detect an e-mail. The main idea is to identify an e-mail that user feel suspicious about the content and originality. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…With the purpose of low SNR effect reduction, the expression is presented a novel Constant Local False Alarm Rate (CLFAR) with Constant Local Detection Rate (CLDR) algorithm, in which Secondary User (SU) can detect the licensed band in high noise variance medium accurately. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Real time power quality event detection using continuous wavelet transform by Tan R.H.G., Ramachandaramurthy V.K.

    Published 2023
    “…This paper shows continuous wavelet transform performs in real time is made possible and it is a promising signal processing algorithm for power quality event detection application. � 2011 IEEE.…”
    Conference paper
  15. 15

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
    Get full text
    Get full text
    Article
  16. 16

    Development Of Control Algorithm For Spot Cooling System by Andy, Tan Wei Keat

    Published 2017
    “…The detection result was verified using a graphical user interface (GUI) software running on a computer. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
    Get full text
    Get full text
    Monograph
  19. 19

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
    Get full text
    Monograph
  20. 20

    Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS by Akbari, M., Reza, A.W., Noordin, K.A., Manesh, M.R., Hindia, M.N.

    Published 2014
    “…Cooperative spectrum sensing (CSS) in cognitive radio (CR) has been widely investigated to be considered as a spectrum scanning mechanism that allows secondary users or cognitive radio users (SUs) to use detected spectrum holes caused by primary users (PUs) absence. …”
    Get full text
    Get full text
    Conference or Workshop Item