Search Results - (( developing preventive extraction algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. …”
    Get full text
    Get full text
    Article
  4. 4

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…Visual surveillance applications play essential roles as a tool for archiving and to some extend preventing criminal activities. The future of visual surveillance applications relies on the developments in the area of computer vision, human motion analysis and computer algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of novel distance relay scheme to prevent false tripping during power swing / Nor Zulaily Mohamad by Mohamad, Nor Zulaily

    Published 2017
    “…The objectives of the research are to develop new intelligent schemes for preventing false relay operation during power swing. …”
    Get full text
    Get full text
    Book Section
  6. 6

    Development of novel distance relay scheme to prevent false tripping during power swing by Mohamad, Nor Zulaily

    Published 2017
    “…The objectives of the research are to develop new intelligent schemes for preventing false relay operation during power swing. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
    Get full text
    Get full text
    Monograph
  10. 10
  11. 11

    Bacteria identification via Artificial Neural Network based-on Bergey’s manual by Ruhaimi, Amirul Hafiiz

    Published 2017
    “…Analyzing and data extraction from Bergey’s manual require high understanding of selected microorganisms in order to prevent any error or inaccurate result generated from ANN. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Recent advancement of remaining useful life prediction of lithium-ion battery in electric vehicle applications: A review of modelling mechanisms, network configurations, factors, a... by Reza M.S., Mannan M., Mansor M., Ker P.J., Mahlia T.M.I., Hannan M.A.

    Published 2025
    “…An efficient prediction of RUL can ensure its safe operation and prevent both internal and external failures, as well as avoid any unwanted catastrophic events. …”
    Review
  13. 13

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…Therefore, the objective of this project is to develop a system which can restrict the right to access to image data and using image encryption algorithms to protect those images to be extract by unauthorized person as well as helping people living in rural area to get medical consultation easier than before. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…This project develops an AI-based anomaly detection system. In the field of autonomous driving, abnormal data will directly affect the safety of autonomous driving systems, especially in terms of abnormal camera sensor data. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity by Yau, Jia Xin

    Published 2023
    “…The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Application of artificial neural network in bacteria identification based on Bergey’s manual: Hydrogenophilaceae family: article by Ruhaimi, Amirul Hafiiz, Ahmad, Normadyzah, Husin, Hazlina, Mohamad Pauzi, Syazana

    Published 2017
    “…Analysing and data extraction from Bergey’s manual require high understanding of selected microorganism in order to prevent any error or inaccurate result generated from ANN. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation of machine learning techniques with big data and IoT to create effective prediction models for health informatics by Zamani, Abu Sarwar, Hassan Abdalla Hashim, Aisha, Shatat, Abdallah Saleh Ali, Akhtar, Md. Mobin, Rizwanullah, Mohammed, Mohamed, Sara Saadeldeen Ibrahim

    Published 2024
    “…In the map phase, the statisticalfeatures and the Principal Component Analysis (PCA) features are extracted. In the reduction phase, the optimal features are selected with theaid of the developed Hybrid Flower Pollination Bumblebees Optimization Algorithm (HFPBOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An automated high-accuracy detection scheme for myocardial ischemia based on multi-lead long-interval ECG and Choi-Williams time-frequency analysis incorporating a multi-class SVM... by Hussein, Ahmed Faeq, Hashim, Shaiful Jahari, Rokhani, Fakhrul Zaman, Wan Adnan, Wan Azizun

    Published 2021
    “…However, an accurate interpretation of these waveforms still calls for the expertise of an experienced cardiologist. Several algorithms have been developed to overcome issues in this area. …”
    Get full text
    Get full text
    Article
  20. 20