Search Results - (( developing implementation function algorithm ) OR ( data detection using algorithm ))
Search alternatives:
- developing implementation »
- implementation function »
- function algorithm »
- using algorithm »
- data detection »
-
1
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The fuzzy-ID3 algorithm with association function implementation (FID3-AF) is proposed as a classification technique for breast cancer detection. …”
Get full text
Get full text
Get full text
Article -
3
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
4
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…It was achieved by developing automated software to generate the new Data Background sequence and rearrange the existing March algorithms’ test operations to remove redundancies and enable the sensitization and detection of the intended faults while preserving their complexities. …”
Get full text
Get full text
Get full text
Article -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Design and implementation of multimedia digital matrix system
Published 2005“…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
Get full text
Get full text
Conference or Workshop Item -
7
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Article -
8
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Get full text
Article -
9
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
10
Terahertz sensing analysis for early detection of ganoderma boninense disease using near infrared (NIR) spectrometer
Published 2023“…Therefore, a DT-based predictive analytic on leaves NIR spectral reference data is developed for real-time detection of G. boninense infection. …”
Get full text
Get full text
Thesis -
11
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
12
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
13
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
14
Car dealership web application
Published 2022“…On the other hand, the data scientists could monitor and debug the models using a SHAP monitoring function, which was improved by the author, with the aid of effective visualizations like model loss bar plot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Subjects:Conference Paper -
16
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The overall software design is divided into three modules which are Image Acquisition, Image Processing and Object Detection, and Data Transmission module. The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
17
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
Get full text
Get full text
Thesis -
18
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
19
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Clustering in WSNs is a reliable method of effectively transferring data within the network through routing. Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
20
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…This study focuses on using Python for remote sensing data analysis to identify and classify healthy crops. …”
Get full text
Get full text
Student Project
