Search Results - (( _ simulation model algorithm ) OR ( based classification system algorithm ))*
Search alternatives:
- classification system »
- based classification »
- system algorithm »
- model algorithm »
-
1
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
2
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
4
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
5
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
6
Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim
Published 2025“…A simulation-based methodology was adopted, leveraging MATLABO/Simulink to model a power grid and generate synthetic PQD waveforms. …”
Get full text
Get full text
Thesis -
7
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…A novel work has been done in producing simulated data based on empirical models of the real waveforms. …”
Get full text
Get full text
Article -
8
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Conference or Workshop Item -
9
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
Article -
10
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
Get full text
Get full text
Thesis -
11
Embedded Fuzzy Classifier for Detection and Classification of Preseizure state using Real EEG data
Published 2014“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Book Section -
12
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Thus it is a suitable model to be used in real time implementation through a Digital Signal Processor (DSP)- based embedded system for power quality disturbances detection and classification.…”
Get full text
Get full text
Thesis -
13
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…The experiment was conducted in a controlled lab environment using open source tools by implementing dynamic analysis on 1260 datasets from the Android Malware Genome Project. Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
14
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
15
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…A novel work has been done in producing simulated data based on empirical models of the real waveforms. …”
Get full text
Get full text
Citation Index Journal -
16
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
17
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…The system is simulated using EPANET (Environmental Prediction Agency Network) software based on actual water distribution system (WDS) data from Benghazi city, Libya. …”
Get full text
Get full text
Thesis -
18
Deep learning-based item classification for retail automation
Published 2025“…This project focuses on developing a deep learning-based system for retail item classification. The project aims to improve the efficiency and recognition accuracy in retail operations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Embedded Fuzzy Classifier for Detection and Classification of Preseizure State Using Real EEG Data
Published 2013“…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
Get full text
Get full text
Get full text
Book Section -
20
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
Get full text
Get full text
Thesis
