Search Results - (( using function method algorithm ) OR ( data detection device algorithm ))

Refine Results
  1. 1

    Smart fall detection by enhanced SVM with fuzzy logic membership function by Harum, Norharyati, Khalil, Mohamad Kchouri, Hazimeh, Hussein, Obeid, Ali

    Published 2023
    “…So far, the most widely used fall prediction methods collect data from inertial measurement unit (IMU) sensors. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
    Get full text
    Get full text
    Thesis
  4. 4

    MiMaLo: advanced normalization method for mobile malware detection by Sriyanto, Sahib @ Sahibuddin, Shahrin, Abdollah, Mohd Faizal, Suryana, Nanna, Suhendra, Adang

    Published 2022
    “…The application of the MiMaLo method using the neural network algorithm produces an accuracy of 93.54% with AUC of 0.982.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Intelligent Fuzzy Classifier for Pre-Seizure Detection from Real Epileptic Data by Shakir, Mohamed, Malik, Aamir Saeed, Kamel, Nidal S., Qidwai, Uvais

    Published 2014
    “…In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of preseizures in real/raw Epilepsy data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection by Ahmad, Mohd Ashraf, Musa, Zulkifli, Zawawi, Mohd Anwar, Mohd Falfazli, Mat Jusof, Mohd Rashid, Muhammad Ikram, Suid, Mohd Helmi, Zaharuddin, Mohamed

    “…The SCA method is used to tune both coefficients in the nonlinear function and the transfer function of the Hammerstein model such that the error between the identified output and the real experimental output is minimized. …”
    Get full text
    Get full text
    Research Report
  9. 9

    Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Fuzzification of epileptic data: an application for prediction and identification of partial seizure by Malik, Aamir Saeed, Nasif, Mohammad Shakir, Kamel , Nidal, Qidwai, U.

    Published 2013
    “…This paper presents a classification technique by using Fuzzy Logic System to identify and predict the partial seizure from epileptic data. …”
    Get full text
    Citation Index Journal
  12. 12
  13. 13
  14. 14

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…An intelligent novel model comprising Random Forest Classifier with Independent Component Analysis (ICA) was proposed for botnet detection in IoT devices. Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20