Search Results - (( users detection a algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat by Assaig, Faisal Ahmed, Gunawan, Teddy Surya, Nordin, Anis Nurashikin, Ab Rahim, Rosminazuin, Mohd Zain, Zainiharyati

    Published 2023
    “…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Robust multi-user detection based on hybrid grey wolf optimization by Ji, Yuanfa, Fan, Z ., Sun, X., Wang, S., Yan, S., Wu, S., Fu, Q., Kamarul Hawari, Ghazali

    Published 2020
    “…The search for an effective nature-inspired optimization technique has certainly continued for decades. In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.] by Buja, Al Ya@Geogiana, Ahmad, Illiasaak, Zolkeply, Mohd Syafiq

    Published 2014
    “…In this project, it introduce to a mechanism to detect an e-mail. The main idea is to identify an e-mail that user feel suspicious about the content and originality. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  8. 8

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…With the purpose of low SNR effect reduction, the expression is presented a novel Constant Local False Alarm Rate (CLFAR) with Constant Local Detection Rate (CLDR) algorithm, in which Secondary User (SU) can detect the licensed band in high noise variance medium accurately. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Real time power quality event detection using continuous wavelet transform by Tan R.H.G., Ramachandaramurthy V.K.

    Published 2023
    “…This paper shows continuous wavelet transform performs in real time is made possible and it is a promising signal processing algorithm for power quality event detection application. � 2011 IEEE.…”
    Conference paper
  12. 12

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
    Get full text
    Get full text
    Article
  13. 13

    Development Of Control Algorithm For Spot Cooling System by Andy, Tan Wei Keat

    Published 2017
    “…The detection result was verified using a graphical user interface (GUI) software running on a computer. …”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…Programming software is required in order to execute the image acquisition and image analysis algorithm. In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…A user-friendly desktop prototype was developed, and users may upload handwritten samples and get immediate results for the dyslexia handwriting type (normal or reversal) and status of handwriting (detect or not detect). …”
    Get full text
    Get full text
    Thesis
  17. 17

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
    Get full text
    Monograph
  18. 18

    Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS by Akbari, M., Reza, A.W., Noordin, K.A., Manesh, M.R., Hindia, M.N.

    Published 2014
    “…Cooperative spectrum sensing (CSS) in cognitive radio (CR) has been widely investigated to be considered as a spectrum scanning mechanism that allows secondary users or cognitive radio users (SUs) to use detected spectrum holes caused by primary users (PUs) absence. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
    Get full text
    Get full text
    Student Project