Search Results - (( variable integration detection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- integration detection »
- variable integration »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
3
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Objectives: An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm, signal drop and network breakdown. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
8
DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS
Published 2011“…An integrated plant data preparation framework for seven boiler trips with related operational variables, has been proposed for the training and validation of the proposed artificial intelligent systems. …”
Get full text
Get full text
Thesis -
9
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
10
-
11
Haar cascade algorithm for microsleep detection
Published 2025“…Based on these results, future research should focus on enhancing the core algorithm to be more resilient to variable lighting and distance, thereby reducing false positives and negatives. …”
Get full text
Get full text
Article -
12
-
13
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
Get full text
Get full text
Thesis -
14
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…The proposed scheme integrates an ADS and signature-based detection system (SDS) approach for better and rapid intrusion detection. …”
Get full text
Get full text
Thesis -
15
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Enhancing safety of micro-mobility and powered mobility devices using YOLOv12-based real-time obstacle detection
Published 2025“…The system integrates a Raspberry Pi 4 with a camera, MPU-6050 accelerometer, and buzzer, utilizing the YOLOv12 object detection model and DeepSORT tracking algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Predicting Cheaters in PlayerUnknown’s Battlegrounds (PUBG) using Random Forest Algorithm
Published 2023“…The outcomes of this research contribute to the advancement of cheat detection mechanisms in online gaming. The developed prediction model can be integrated into existing systems to improve cheat detection capabilities and promote an enjoyable and fair gaming experience for all PUBG participants…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…This paper proposed a hybrid artificial bee colony (HABC) strategy based on the hybrid artificial bee colony algorithm and practical swarm optimization to generate optimal test suite of variable strength interaction. …”
Get full text
Get full text
Article -
19
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…This paper proposed a hybrid artificial bee colony (HABC) strategy based on the hybrid artificial bee colony algorithm and practical swarm optimization to generate optimal test suite of variable strength interaction. …”
Get full text
Get full text
Article -
20
Modelling of cupping suction system based on system identification method
Published 2022“…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
