Search Results - ((((conversion algorithm) OR (generation algorithm))) OR (detection algorithm))
Search alternatives:
- conversion algorithm »
- generation algorithm »
-
1
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…This project concerns the design and fabrication of the Automated Guided Robot (AGR) prototype, utilizing artificial intelligence (AI) and genetic algorithm (GA) as a mainframe in helping the robot to generate a self-understanding of the area of work and mobilization to a destination desired by the user. …”
Get full text
Get full text
Final Year Project -
3
On the Identification of FOSD-based Non-zero Onset Speech Dataset
Published 2020“…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
Get full text
Get full text
Conference or Workshop Item -
4
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…Similar processes are used in the generation and embedding phases of a watermark. The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
6
The Fuzzy Logic Approach for Modelling Object Physical Features and Holes Occupancies
Published 2008“…There are four major algorithms involved. They are known as coloured balls detection, holes recognition, cupboard’s holes’ position modelling and pixel coordinate system (PCS) to robot coordinate system (RCS) conversion. …”
Get full text
Get full text
Conference or Workshop Item -
7
Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning
Published 2022“…The project will use natural language processing in extracting certain features as the input of an algorithm to generate a reputation score that will be trained using machine learning to build the detection model. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…Active detection algorithm generates disturbances at the output by Positive feedback and Continuous feedback signal injection which is based on DQ implementation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The accuracy of the algorithm developed in detecting tumour is 94.38% showing that it is relevant for use by radiologists. …”
Get full text
Get full text
Monograph -
11
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
Get full text
Get full text
Get full text
Article -
12
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
13
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…A high-complexity test algorithm like the March MSS (18N) can guarantee the detection of all unlinked static faults in SRAM. …”
Get full text
Get full text
Get full text
Article -
14
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
Get full text
Get full text
Thesis -
15
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
Get full text
Get full text
Get full text
Thesis -
16
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
Get full text
Get full text
Thesis -
17
A comparative evaluation on data transformation approach for artificial speech detection
Published 2024“…Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
18
Open phase fault-tolerant support vector machine predictive power control for six-phase induction generator WECS
Published 2025“…Importantly, this approach does not require reconfiguring the control algorithm while preserving the system?s effective performance. …”
Article -
19
Fault detection with optimum March test algorithm
Published 2013“…The automation hardware was designed to give the flexibility to the user to generate other new March Algorithm prior to the selected algorithm and analyzed the performance in terms of fault detection and power consumption.…”
Get full text
Get full text
Get full text
Article -
20
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph
