Search Results - (( developing function method algorithm ) OR ( data detection system algorithm ))

Refine Results
  1. 1

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…The solution strategy started in its initial input and process to find effective stations that can serve the railway monitoring system well. The researcher developed a new clustering model to separate the necessary data from unnecessary data, and specified the suitable primary stations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
    Get full text
    Get full text
    Article
  6. 6

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Generation of new low-complexity March algorithms for optimum faults detection in SRAM by Jidin, Aiman Zakwan, Hussin, Razaidi, Lee, Weng Fook, Mispan, Mohd Syafiq, Zakaria, Nor Azura, Loh, Wan Ying, Zamin, Norshuhani

    Published 2023
    “…This article presents a method to generate new March algorithms that provide optimum coverage on faults introduced by the nanometer process technologies. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The results show that the proposed infeasible path detection method was efficient and detect 99 percent of the infeasible paths in the three industrial systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain by Mohamad Zain, Muhammad Asyraf

    Published 2020
    “…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The developed methods are successfully tested on IEEE standard systems and the Sabah Electricy Sdn. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Terahertz sensing analysis for early detection of ganoderma boninense disease using near infrared (NIR) spectrometer by Mas Ira Syafila, Mohd Hilmi Tan

    Published 2023
    “…Therefore, a DT-based predictive analytic on leaves NIR spectral reference data is developed for real-time detection of G. boninense infection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm by Abdurrahim, Salem Hamed

    Published 2004
    “…The proposed technique based on the watershed algorithm, which is applied to the gradient magnitude of the MRI data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hydraulic characterization of PVC-O pipes by means of transient tests by Ghazali, M. F., Nizwan, Che Ku Eddy, Ismail, Nurazima, Sani, M. S.M., Yusof, Mohd Fadhlan M., Mohamed, Zamri

    Published 2019
    “…The obtained results indicate that when the distance of the leakage increase, the accuracy of the detected data would be less accurate, and when the pressure of the pipeline decreases, the detected data would be less accurate also. …”
    Get full text
    Get full text
    Research Report
  19. 19

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
    Article
  20. 20