Search Results - (( variable activation detection algorithm ) OR ( java implementation 5s algorithm ))
Search alternatives:
- activation detection »
- java implementation »
- implementation 5s »
- 5s algorithm »
- variable »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
3
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
4
-
5
-
6
-
7
-
8
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
9
-
10
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
11
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…The performance of the algorithm achieved a sensitivity of 100% for QRS onset detection and 100% for T offset detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
13
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
16
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
17
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019“…The main objective for this study is to analyse the harmonics components in AC power system using Fast Fourier Transforms (FFT) algorithm. Other than that, the objective is also to design and develop the harmonic detection system for power quality of AC power system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…Human activity detection through fusion of multimodal sensors are vital steps to achieve automatic and comprehensive monitoring of human behaviours, build smart home systems and detect sports activities. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
