Search Results - (( using detection system algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- system algorithm »
- java application »
- using detection »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Object detection system using haar-classifier
Published 2009“…Object detection system using Haar-classifier algorithm can perform best performance of high detection rate and high level of accuracy rate.…”
Get full text
Get full text
Undergraduates Project Papers -
3
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
Get full text
Get full text
Thesis -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
5
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
6
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), and support vector machine (SVM) have been used for IDS in the last decades. …”
Get full text
Get full text
Get full text
Article -
7
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
8
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
9
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Then the new rotation angle is used to detect bleeding in the patient and evaluate the performance of the new algorithm. …”
Get full text
Get full text
Thesis -
11
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…The computation efficiency of the proposed algorithm has enabled the implementation of the soft robotic glove system prototype by using simple hardware.…”
Get full text
Get full text
Thesis -
12
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. …”
Get full text
Get full text
Thesis -
13
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…The CICIDS2017 dataset was used to analyze the performance of the existing intrusion detection system model. …”
Get full text
Get full text
Article -
14
-
15
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challenging to detect such malicious behaviour using traditional intrusion detection systems. …”
Get full text
Get full text
Thesis -
16
Embedded system based driver drowsiness detection system
Published 2023“…FPGA hardware is used as its processing platform along with Viola-Jones object detection algorithm. …”
Conference paper -
17
-
18
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…The goal of intrusion detection is to discover unauthorized use of computer systems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…This indicates that highest detection accuracy, high throughput performance and lowest detection time (i.e., fast detection) can effectively be achieved by RMD algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article
