Search Results - (( using alert based algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- java adaptation »
- using alert »
- alert based »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
3
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…It combines the following algorithms: the first algorithm is New Alert Reduction (NAR) algorithm to remove the redundancy from the alert’s file and reduce the false positives.…”
Get full text
Get full text
Thesis -
4
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The overall result significantly indicates that a novel security alert framework using dynamic tweet-based features for phishing detection on Twitter has been formulated. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
ARDUINO-BASED FALL DETECTION AND ALERT SYSTEM
Published 2017“…In this project, a smart Arduino-based fall detection and alert system is developed to monitor elder activities and alert the respective person if there is any accident fall. …”
Get full text
Get full text
Final Year Project -
8
Fire alarm system with real-time monitoring and alert system using IOT / Muhammad Habib Shaharuddin
Published 2024“…The hub uses sophisticated algorithms to assess incoming data in real time and identify any fire problems. …”
Get full text
Get full text
Student Project -
9
Development of a driver detection system for somnolence and alertness based on image processing techniques
Published 2024“…Dlib’s facial landmark is used and the coordinates of the right and left eye of the driver were taken and then the eye aspect ratio (EAR) algorithm is used. …”
Get full text
Get full text
Get full text
Book Chapter -
10
IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al]
Published 2025“…This study presents an Internet of Things (IoT)-based intelligent monitoring and alert system for detecting headwater phenomena in real time. …”
Get full text
Get full text
Get full text
Article -
11
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
Get full text
Get full text
Undergraduates Project Papers -
12
-
13
Comparison of EEG signals during alert and sleep inertia states using fractal dimension
Published 2018“…Each EEG signal were analyzed based on its fractal dimension estimated using Higuchi's algorithm. …”
Get full text
Get full text
Article -
14
Development of wireless engine lubrication oil life alert system
Published 2015“…The proposed system is capable of determining the total revolution experienced by the engine even at high revolution of the engine and able to predict a maximum lifetime supposed to be limited for the type of engine oil used by using the proposed oil change algorithm, MAXREV=(1.2)(highest gear ratiotire circumference)×distance travelled. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
Get full text
Get full text
Get full text
Citation Index Journal -
17
UiTM panic button using location-based Algorithm / Fatin Munirah Musa
Published 2015“…The application will be use Location-Based Service (LBS) which is GPS technology. …”
Get full text
Get full text
Thesis -
18
-
19
Speech enhancement based on compressive sensing algorithm
Published 2013Get full text
Get full text
Get full text
Article -
20
Suspicious activity trigger system using YOLOv6 convolutional neural network
Published 2023“…Based on the experiment, 92.53% for precision and 96.6% of the accuracy is obtained using this algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
