Search Results - (( based constructive method algorithm ) OR ( user detection method algorithm ))

Refine Results
  1. 1
  2. 2

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Memory testing is a method that requires an algorithm capable of detecting faulty memory as comprehensively as possible to facilitate the efficient manufacture of fault free memory products. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…In this step, user hear the speech and used the hand labelling method discuss in chapter 2. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Automatic Road Network Recognition and Extraction for Urban Planning by Bong, David B L, Lai, K.C., Joseph, A.

    Published 2009
    “…Besides, edge detection method is applied to further filter out the non-road regions. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  9. 9

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. …”
    Get full text
    Get full text
    Thesis
  10. 10

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…During data collection, empirical model method is used in order to construct the reference table. …”
    Get full text
    Student Project
  12. 12

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  14. 14

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil

    Published 2013
    “…In addition, the technique is proposed as a new algorithm for joint channel est imation of the multi-cell model based on reduced rank technique handling the active users in serving cell and the strong interferers from the neighboring cells. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Graphical user interface test case generation for android apps using Q-learning / Husam N. S. Yasin by Husam , N. S. Yasin

    Published 2021
    “…The computation time complexity of the Q-Learning-based test coverage algorithm was also analyzed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  19. 19
  20. 20