Search Results - ((((connection algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network by Jamaludin, Sallim, Rozlina, Mohamed, Roslina, Abd Hamid

    Published 2015
    “…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…Connected components algorithm was implemented for insect detection and counting. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Hybrid ACO-Graph Entropy for Functional Modules Detection From Protein-Protein Interaction Network by Jamaludin, Sallim, Rozlina, Mohamed, Che, Yahaya, Roslina, Abdul Hamid

    Published 2018
    “…Various graph clustering algorithms have been applied to protein interaction networks for detecting protein functional modules. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…One of the security challenges in Software Defined networking (SON) is Distributed denial of service (DDoS) attacks that overwhelm the controller and consume its resources making it unreachable effecting the connectivity throughout the entire network. To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…The experiment on noisy data stream shows that BOCEDS algorithm can detect noise with an accuracy of approximately 100%. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fusion of linear and nonlinear functional model for cadastral network adjustment / Nazurah Syahzanani Amiruddin by Amiruddin, Nazurah Syahzanani

    Published 2024
    “…Due to the significant discrepancy in functional models, this study begins with the identification of an algorithm to harmonize the linear (GNSS vectors) and non-linear (traverse) models. …”
    Get full text
    Get full text
    Student Project
  8. 8
  9. 9

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee by Chong , Hue Yee

    Published 2023
    “…Different types of metaheuristic optimization tools have their unique features which vary from others and hence lead to different suitability in the particular application. Two metaheuristic algorithms i.e., Harmony Search (HS) and Gravitational Search Algorithm (GSA), are selected to integrate separately with a Radial Basis Function Network with Dynamic Decay Adjustment (RBFN-DDA) to perform condition monitoring in industrial processes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of an automated multidirectional pest sampling detection system using motorized sticky traps by Hadi, Mustafa Kareem, Mohd Kassim, Muhamad Saufi, Wayayok, Aimrun

    Published 2021
    “…Different kernel functions, such as disk, diamond, square, and sphere, were used as matching functions for the insect detection and counting algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…Moreover, the usage of the reweighted cross-entropy loss function makes our proposed algorithm more robust as the training data is highly imbalanced. …”
    Get full text
    Get full text
    Article
  15. 15

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…Moreover, the usage of the reweighted cross-entropy loss function makes our proposed algorithm more robust as the training data is highly imbalanced. …”
    Get full text
    Get full text
    Article
  16. 16

    Intelligent failure connection algorithm for detecting internet worms by M. Rasheed, Mohammad, Md Norwawi, Norita, Ghazali, Osman, M. Kadhum, Mohammed

    Published 2009
    “…In this paper, we show that our algorithm can detect new types of worms. This paper shows that intelligent Failure Connection Algorithm (IFCA) operation is faster than traditional algorithm in detecting worms.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review by Ibrahim, Buhari, Suppiah, Subapriya, Ibrahim, Normala, Mohamad, Mazlyfarina, Abu Hassan, Hasyma, Syed Nasser, Nisha, Saripan, M. Iqbal

    Published 2021
    “…Resting-state fMRI (rs-fMRI) detects functional connectivity (FC) abnormalities that occur in the brains of patients with Alzheimer's disease (AD) and mild cognitive impairment (MCI). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
    Get full text
    Get full text
    Article
  20. 20

    Detecting video spammers in YouTube social media by Yusof, Yuhanis, Sadoon, Omar Hadeb

    Published 2017
    “…Even though the detection of malicious users is based on various features such as content details, social activity, social network analyzing, or hybrid, the detection rate is still considered low (i.e. 46%).This study proposes a new set of features by constructing features based on the Edge Rank algorithm.Experiments were performed using nine classifiers of different learning; decision tree, function-based and Bayesian. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item