Search Results - (( user detection method algorithm ) OR ( data optimization method algorithm ))

Refine Results
  1. 1

    The optimization of stepping stone detection: packet capturing steps by Omar, Mohd. Nizam, Maarof, Mond. Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    The optimization of stepping stone detection : packet capturing steps by Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    The optimization of stepping stone detection: Packet capturing steps by Omar, Mohd Nizam, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2006
    “…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
    Get full text
    Get full text
    Article
  5. 5

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches by Ahmad Khan, Muzammil, Mahmood Khan, Shariq, Subramaniam, Siva Kumar

    Published 2023
    “…In the first phase, DU authentication detects and eliminates authorized users. We suggested a chaotic map-based camellia encryption algorithm (CMCE) to boost security. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…The case study use for this experiment is Sobel edge detection algorithm. The test data set focuses on processing images of three different sizes; (IK x IK), (2K x 2K) and (3K x 3K). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…Basics and ensures that the software is more secure than the previous traditional attendance method using roll-less slides. For face detection the system uses a YOLO (You Only Look Once) algorithm, which allows quick and efficient recognition of student faces in the classroom context. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…Most of the existing algorithms consider the noise filtering step precedes trajectory segmentation step which mean that there is no preprocessing method to partition trajectory into set of segments and remove noise points in real time with low computational cost. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning by Abuzaraida, Mustafa Ali, A. L. gaud, Sarah, Abrahim Hneish, Hamza, Attarbashi, Zainab

    Published 2026
    “…The system demonstrated high efficiency and accuracy in performance, mimicking human coffee brewing methods. The results demonstrate the potential of the YOLOv8 algorithm to automate and optimize routine tasks with high accuracy.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Modeling of road geometry and traffic accidents by hierarchical object-based and deep learning methods using laser scanning data by Sameen, Maher Ibrahim

    Published 2018
    “…Experimental results regarding road geometry extraction indicated that the proposed methods could achieve relatively high accuracy (~ 85% - User’s Accuracy) of road detection from airborne laser scanning data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20