Search Results - (( using alert based algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts by Al-Saedi, Karim Hashim Kraidi

    Published 2013
    “…It combines the following algorithms: the first algorithm is New Alert Reduction (NAR) algorithm to remove the redundancy from the alert’s file and reduce the false positives.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…The overall result significantly indicates that a novel security alert framework using dynamic tweet-based features for phishing detection on Twitter has been formulated. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    ARDUINO-BASED FALL DETECTION AND ALERT SYSTEM by Mohd Arifin, Izuan Alif

    Published 2017
    “…In this project, a smart Arduino-based fall detection and alert system is developed to monitor elder activities and alert the respective person if there is any accident fall. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Fire alarm system with real-time monitoring and alert system using IOT / Muhammad Habib Shaharuddin by Shaharuddin, Muhammad Habib

    Published 2024
    “…The hub uses sophisticated algorithms to assess incoming data in real time and identify any fire problems. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Development of a driver detection system for somnolence and alertness based on image processing techniques by Mohd Fauzi, Abu Hassan, Ahmad Arifridhwan, Yakcob, Anis Sofi, Ahamad Saleh, Ahmad Shahrizan, Abdul Ghani, Mohd Helmy, Abd Wahab

    Published 2024
    “…Dlib’s facial landmark is used and the coordinates of the right and left eye of the driver were taken and then the eye aspect ratio (EAR) algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10
  11. 11

    Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques by Muhammad Afnan, Mohammad Nasir

    Published 2022
    “…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Comparison of EEG signals during alert and sleep inertia states using fractal dimension by Radzi, S.S.M., Asirvadam, V.S., Hutapea, D.K.Y., Dass, S.C.

    Published 2018
    “…Each EEG signal were analyzed based on its fractal dimension estimated using Higuchi's algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of wireless engine lubrication oil life alert system by Tin, Shaw Liang

    Published 2015
    “…The proposed system is capable of determining the total revolution experienced by the engine even at high revolution of the engine and able to predict a maximum lifetime supposed to be limited for the type of engine oil used by using the proposed oil change algorithm, MAXREV=(1.2)(highest gear ratiotire circumference)×distance travelled. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  17. 17

    UiTM panic button using location-based Algorithm / Fatin Munirah Musa by Musa, Fatin Munirah

    Published 2015
    “…The application will be use Location-Based Service (LBS) which is GPS technology. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Suspicious activity trigger system using YOLOv6 convolutional neural network by Suryanti, Awang, Mohd Qhairel, Rafiqi Rokei, Sulaiman, Junaida

    Published 2023
    “…Based on the experiment, 92.53% for precision and 96.6% of the accuracy is obtained using this algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item