Search Results - (( based constructive method algorithm ) OR ( set detection method algorithm ))

Refine Results
  1. 1

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…First, the grid mapping of the robot's workspace environment is constructed, and then the borders of the workspace environment are detected based on the new proposed function. …”
    Get full text
    Thesis
  2. 2

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  7. 7

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…The results show that this method can be used for significant reduction of data set. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Model-based hybrid variational level set method applied to lung cancer detection by Jing, Wang, Liew, Siau-Chuin, Azian, Abd Aziz

    Published 2024
    “…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Determining gender differential item functioning for mathematics in coeducational school culture by Shanmugam, S. Kanageswari Suppiah

    Published 2018
    “…By employing the software WINSTEPS version 3.67.0 that is based on the Rasch Model for dichotomous responses, Differential Item Functioning analysis was conducted by using Mantel-Haenszel Chi-square method. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.] by Mazani, Muhammad Naim, Abdul-Rahman, Shuzlina, Mutalib, Sofianita

    Published 2020
    “…The objectives of this study are to pre-process the scanned images and apply the image recognition algorithm for lane detection. The study employed Canny Edge Detection and Hough Transform algorithms on several sets of images. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Naïve-Bayes classifier for damage detection in engineering materials by Addin, O., Salit, Mohd Sapuan, Mahdi Ahmad Saad, Elsadig, Othman, Mohamed

    Published 2007
    “…The Naïve-Bayes classifier and the feature sub-set selection method were analyzed and tested on two sets of data. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…It sets a great benchmark for future work on driver drowsiness detection. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
    Get full text
    Article
  20. 20

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise