Search Results - (( user evaluation a algorithm ) OR ( based detection system algorithm ))*

Refine Results
  1. 1

    The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel by Jeoti , Varun

    Published 2010
    “…In this approach , which is opposite of the current spectrum allocation, a secondary user (unlicensed) shares a frequency band with designated primary users (licensed) without causing interference or performance degradation to the primary users. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
    Get full text
    Get full text
    Thesis
  5. 5

    A wheelchair sitting posture detection system using pressure sensors by Mohamad Yusoff, Muhammad Annuar Alhadi, Azmi, Nur Liyana, Nordin, Nor Hidayati Diyana

    Published 2024
    “…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  7. 7

    Adaptive method to improve web recommendation system for anonymous users by Almurtadha, Yahya Mohammed

    Published 2011
    “…The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cyclostationarity-based spectrum sensing for analog TV and wireless microphone signals by V., Jeoti, A.M., Mossa

    Published 2009
    “…Spectrum sensing is a vital signal processing task in the cognitive radio systems in order to detect and identify the primary users signals (the licensees). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…The object detection algorithm achieved a mean Average Precision (mAP) of 91.5% in the metric evaluation, while the accuracy testing yielded a 98.3% accuracy rate. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran by Amran, Aiman Syafwan

    Published 2023
    “…The system was developed as a web-based system in order to make it easily accessible by the target user which the governance body from any public nor private sectors. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Malware authors use android market as a hub for malicious apps and spread malware to users with the intention to threaten privacy; and this has remained undetected due to the weakness in signature-based detection. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Electroencephalogram signal interpretation system for mobile robot by Hasan, Intan Helina

    Published 2013
    “…Using signals from the chosen four electrodes to evaluate the signal interpretation system, a success rate of 75-80% is received. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The more the algorithm use in a project the better performance will be in result.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…A single cell composed with one base station (BS) and N classes of users is considered. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Therefore, the improved AKF algorithm is a suitable technique for applications in computer vision fields such as passive object-based video authentication systems.…”
    Get full text
    Get full text
    Article
  20. 20

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
    Get full text
    Get full text
    Undergraduates Project Papers