Search Results - (( variable activity detection algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  3. 3
  4. 4

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER by MIZA, BELIA

    Published 2019
    “…The main objective for this study is to analyse the harmonics components in AC power system using Fast Fourier Transforms (FFT) algorithm. Other than that, the objective is also to design and develop the harmonic detection system for power quality of AC power system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  7. 7

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…Human activity detection through fusion of multimodal sensors are vital steps to achieve automatic and comprehensive monitoring of human behaviours, build smart home systems and detect sports activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS by FIRAS BASIM, ISMAIL ALNAIMI

    Published 2011
    “…The first intelligent monitoring system represents the use of the pure artificial neural network system for boiler trip detection. The final architecture for this system has been explored after investigation of various main neural network topology combinations which include one and two hidden layers, one to ten neurons for each hidden layer, three types of activation function, and four types of multidimensional minimization training algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11

    A peer-to-peer blockchain based interconnected power system by Ahmed, Musse Mohamud, Mohammad Kamrul, Hasan, Muhammad, Shafiq, Md Ohirul, Qays, Gadekallu, Thippa Reddy, Nebhen, Jamel, Shayla, Islam

    Published 2021
    “…It describes the simulation analysis and reduction of harmonics detection in a peer-to-peer interconnected 3-phase power system with the help of an FFT algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Intrusion detection systems (IDSs) effectively balance additional security in a computer system by identifying intrusive activities on a computer system, and their enhancements are developing at a surprising rate. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
    Get full text
    Get full text
    Thesis
  19. 19

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis