Search Results - (( features detection method algorithm ) OR ( parameter simulation based algorithm ))

Refine Results
  1. 1

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…Facial feature detection must first be performed before any of the face recognition methods can be applied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data by Qidwai, U., Malik, A.S., Shakir, M.

    Published 2014
    “…The algorithm also utilizes certain statistical features from the EEG signal that are used as features to the classifier logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Power quality problem classification based on Wavelet Transform and a Rule-Based method by Nallagownden, Perumal

    Published 2010
    “…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
    Get full text
    Get full text
    Article
  5. 5

    Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method by Chuah , Heng keow, Nallagownden, Perumal, Kondapalli, K.S. Rama Rao

    Published 2010
    “…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method by keow, Chuah Heng, Nallagownden, Perumal, K. S. , Rama Rao

    Published 2010
    “…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Embedded Fuzzy Classifier for Detection and Classification of Preseizure State Using Real EEG Data by Qidwai, Uvais, Malik, Aamir Saeed, Shakir, Mohamed

    Published 2013
    “…The algorithm also utilizes certain statistical features from the EEG signal that are used as features to the classifier logic. …”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…The disturbances waveforms obtained from the simulation axe decomposed by wavelet packet transform and used to extract the distinctive features of the voltage signals. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A novel islanding detection technique using modified Slantlet transform in multi-distributed generation by Hizam, Hashim, Ahmadipour, Masoud, Mohd Radzi, Mohd Amran, Othman, Mohammad Lutfi, Chireh, Nikta

    Published 2019
    “…Slantlet transform is utilized to derive the features in the required detection parameters measured from islanding and non-islanding events using identified Slantlet scales. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    High impedance fault detection and localization in 11kV distribution system / Mohd Syukri Ali by Mohd Syukri , Ali

    Published 2018
    “…Subsequent algorithm simulation results show that the proposed methods are able to detect and subsequently locate the faults with high accuracies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone by Saipullah, Khairul Muzzammil

    Published 2013
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Three algorithms were used to accomplish the task of feature representation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm by Zuwairie, Ibrahim, Mohd Zaidi, Mohd Tumari, Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Mohd Ibrahim, Shapiai

    Published 2014
    “…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
    Get full text
    Get full text
    Article
  18. 18

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20