Search Results - (( _ constructive method algorithm ) OR ( data detection method algorithm ))

Refine Results
  1. 1

    Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim by Abd Rahaim, Muhammad Hafizi

    Published 2018
    “…Then, the image was being processed in the photogrammetry software to produce the orthomosaic and point cloud data. These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
    Get full text
    Thesis
  9. 9

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  12. 12

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Parallel visualization approach of a 3D heart model by Malekpour, A., Ling, T.C., Lim, W.C.

    Published 2008
    “…With this knowledge, we propose improvement to the existing deterministic algorithm. An algorithm for detection of and dealing with the aliasing problem is also suggested Test results show that our proposed combinational deterministic method and the anti aliasing technique improves the system performance by up to 33% compared to other deterministic method using single scalar values.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Hydraulic characterization of PVC-O pipes by means of transient tests by Ghazali, M. F., Nizwan, Che Ku Eddy, Ismail, Nurazima, Sani, M. S.M., Yusof, Mohd Fadhlan M., Mohamed, Zamri

    Published 2019
    “…The obtained results indicate that when the distance of the leakage increase, the accuracy of the detected data would be less accurate, and when the pressure of the pipeline decreases, the detected data would be less accurate also. …”
    Get full text
    Get full text
    Research Report
  16. 16
  17. 17

    Fault Detection and Isolation for Complex System by Chan, Shi Jing, Bayuaji, Luhur, Rosdiyana, Samad, Mahfuzah, Mustafa, Nor Rul Hasma, Abdullah, Zainah, Md. Zain, Pebrianti, Dwi

    Published 2017
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
    Get full text
    Get full text
    Article
  19. 19

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis