Search Results - (( using function method algorithm ) OR ( data detection device algorithm ))
Search alternatives:
- method algorithm »
- device algorithm »
- function method »
- using function »
- data detection »
-
1
Smart fall detection by enhanced SVM with fuzzy logic membership function
Published 2023“…So far, the most widely used fall prediction methods collect data from inertial measurement unit (IMU) sensors. …”
Get full text
Get full text
Get full text
Article -
2
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
Get full text
Get full text
Thesis -
4
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…The application of the MiMaLo method using the neural network algorithm produces an accuracy of 93.54% with AUC of 0.982.…”
Get full text
Get full text
Get full text
Article -
5
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
Get full text
Get full text
Thesis -
7
Intelligent Fuzzy Classifier for Pre-Seizure Detection from Real Epileptic Data
Published 2014“…In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of preseizures in real/raw Epilepsy data. …”
Get full text
Get full text
Conference or Workshop Item -
8
Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection
“…The SCA method is used to tune both coefficients in the nonlinear function and the transfer function of the Hammerstein model such that the error between the identified output and the real experimental output is minimized. …”
Get full text
Get full text
Research Report -
9
Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data
Published 2014“…In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Fuzzification of epileptic data: an application for prediction and identification of partial seizure
Published 2013“…This paper presents a classification technique by using Fuzzy Logic System to identify and predict the partial seizure from epileptic data. …”
Get full text
Citation Index Journal -
12
-
13
Portable Stress Detection System for Autistic Children Using Fuzzy Logic
Published 2024journal::journal article -
14
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…An intelligent novel model comprising Random Forest Classifier with Independent Component Analysis (ICA) was proposed for botnet detection in IoT devices. Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
Get full text
Get full text
Article -
15
-
16
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
17
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article
