Search Results - (( user evaluation a algorithm ) OR ( based detection system algorithm ))*
Search alternatives:
- system algorithm »
- user evaluation »
- evaluation a »
- a algorithm »
-
1
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010“…In this approach , which is opposite of the current spectrum allocation, a secondary user (unlicensed) shares a frequency band with designated primary users (licensed) without causing interference or performance degradation to the primary users. …”
Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
3
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
4
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
Get full text
Get full text
Thesis -
5
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
7
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
Get full text
Get full text
Thesis -
8
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
Get full text
Get full text
Student Project -
9
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
Get full text
Get full text
Thesis -
10
Cyclostationarity-based spectrum sensing for analog TV and wireless microphone signals
Published 2009“…Spectrum sensing is a vital signal processing task in the cognitive radio systems in order to detect and identify the primary users signals (the licensees). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli
Published 2023“…The object detection algorithm achieved a mean Average Precision (mAP) of 91.5% in the metric evaluation, while the accuracy testing yielded a 98.3% accuracy rate. …”
Get full text
Get full text
Thesis -
12
Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran
Published 2023“…The system was developed as a web-based system in order to make it easily accessible by the target user which the governance body from any public nor private sectors. …”
Get full text
Get full text
Thesis -
13
Maldroid- attribute selection analysis for malware classification
Published 2019“…Malware authors use android market as a hub for malicious apps and spread malware to users with the intention to threaten privacy; and this has remained undetected due to the weakness in signature-based detection. …”
Get full text
Get full text
Get full text
Article -
14
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
15
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using signals from the chosen four electrodes to evaluate the signal interpretation system, a success rate of 75-80% is received. …”
Get full text
Get full text
Thesis -
16
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Accurate and fast detection on such threats in a timely manner is vital. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The more the algorithm use in a project the better performance will be in result.…”
Get full text
Get full text
Thesis -
18
Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation
Published 2007“…A single cell composed with one base station (BS) and N classes of users is considered. …”
Get full text
Get full text
Thesis -
19
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
Get full text
Get full text
Article -
20
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers
