Search Results - ((((control algorithm) OR (extraction algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Anomaly detection in ICS datasets with machine learning algorithms by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Abdul Rahman, Farah Diyana, Tahir, Mohammad

    Published 2021
    “…The features of flow-based network traffic are extracted for behavior analysis with port-wise profiling based on the data baseline, and anomaly detection classification and prediction using machine learning algorithms are performed.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…The experiment investigations elucidate that the proposed feature extraction algorithms give very promising classification accuracy for the classification of normal and pathological voices under controlled and noisy environment. …”
    Get full text
    Thesis
  4. 4

    Malaysian license plate number detection based on sobel vertical edge algorithm / Siti Nor Azimah Ibrahim by Ibrahim, Siti Nor Azimah

    Published 2007
    “…The system captures the images of the vehicles with a digital camera. An algorithm for the detection of license plate has been designed and an algorithm for filter the detected edge is proposed for future process which is plate number extraction This project describes the method used by a computer to convert digital images of vehicles license plate into electronic text. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abdul Rahman, Nor Farahaida

    Published 2014
    “…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    QUAD FLAT NO-LEAD (QFN) DEVICE FAULTY DETECTION USING GABOR WAVELETS by Tay , Wai Lun

    Published 2014
    “…Computer vision inspection system using image processing algorithms have been utilized by many manufacturing companies as a method of quality control. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter by Nooralishahi, Parham, Loo, Chu Kiong, Shiung, Liew Wei

    Published 2019
    “…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
    Proceedings Paper
  10. 10

    Square groove detection based on Förstner with canny edge operator using laser vision sensor by Mohd Shah, Hairol Nizam, Nik Anwar, Nik Syahrim, Mohammed Naji, Osamah Abdullah Ahmed, Johan, Nurul Fatiha

    Published 2023
    “…The acquired detection results are sufciently accurate, with maximum relative errors of less than 3.19%, demonstrating the rationale of the suggested visual sensor’s physical design and the validity of the proposed detection algorithms…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Quality inspection of engraved image using based matching approach by Norazlina , Ahmad, Marizan, Sulaiman, Muhamad Khairi, Aripin

    Published 2011
    “…Several objects are engraved on the acrylic souvenir bases with different color background to test the algorithm. This experiment result shows that the algorithm works better with detection rate of 100% and matching accuracy of more than 98%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Particle swarm optimization with deep learning for human action recognition by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Also, the current motion target detection algorithms extract features from the relevant object only if the moving object has complex texture features. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Development of an intelligent multimodal biometric system for household appliances control by Abiodun musa, Aibinu

    Published 2012
    “…In the first phase, individual biometrics recognition algorithms were developed for each biometrics feature. …”
    Get full text
    Get full text
    Get full text
    Monograph
  19. 19

    Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin by Jamaludin, Nur Fadhilah

    Published 2015
    “…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Shunt active power filter with modified synchronous reference frame technique and fuzzy logic current controller for harmonic mitigation by Suleiman, Musa

    Published 2017
    “…First, harmonic extraction using SRF for three-phase three-wire system introduces a band pass filter, and second, simple three membership functions in fuzzy logic controller for inputs and five outputs are designed to improve performance of the switching algorithm. …”
    Get full text
    Get full text
    Thesis