Search Results - (( java application optimisation algorithm ) OR ( parameter detection matching algorithm ))

Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…This paper reports the finding of segmentation experiment using four criterions ie. the insertion, omissions, accuracy and segmentation match between the algorithms. The result shows that divergence algorithm performed only slightly better and has opposite effect of the testing parameter p and L compared to Brandt’s GLR. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…In the final localization step, with the adjustment of the parameters, the result shows that this algorithm was able to correctly localize all input models from the scene point cloud, achieving a 100% localization accuracy.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Adaptive template matching of photoplethysmogram pulses to detect motion artefact by Lim, Pooi Khoon, Ng, Siew Cheok, Lovell, Nigel Hamilton, Yu, Yong Poh, Tan, Maw Pin, McCombie, Devin, Lim, Einly, Redmond, Stephen James

    Published 2018
    “…Integration of the proposed artefact detection technique into remote monitoring devices could enhance reliability of the PPG-derived physiological parameters.…”
    Get full text
    Get full text
    Article
  8. 8

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    A generalized mixed model framework for assessing fingerprint individuality in presence of varying image quality by Dass, S.C., Lim, C.Y., Maiti, T.

    Published 2014
    “…We develop algorithms based on the Laplace approximation of the likelihood and infer the unknown parameters based on this approximate likelihood. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    An automated approach for analysis of Fourier Transform Infrared (FTIR) spectra of edible oils by Siong-Fong, Sim, Woei, Ting

    Published 2012
    “…This paper reports a computational approach for analysis of FTIR spectra where peaks are detected, assigned and matched across samples to produce a peak table with rows corresponding to samples and columns to variables. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A robust traffic quantity measurement with video surveillance by Rad, A.G., Karim, M.R.

    Published 2011
    “…The method consists of three algorithms. First, background modeling and update, second, a boosting method to enhance the foreground image and reduce the noise and at last determining best match of region of interest (ROI) to extract information to conclude if there is a vehicle in the detection zone or not. …”
    Get full text
    Get full text
    Article
  16. 16

    Nonlinear vibration based modeling for damage detection of reinforced concrete beams / Muhammad Usman Hanif by Muhammad Usman , Hanif

    Published 2018
    “…The nonlinear behavior, in the form of nonlinear vibration characteristics, was used in proposing a damage detection algorithm which doesn’t rely on the baseline data of the structure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan by Keshasni , Earichappan

    Published 2023
    “…The average MC and torque data were set as input parameters and binary formed fatigue levels were set as output parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots by Ahmad, Nazrul Muhaimin

    Published 2018
    “…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Evaluating and predicting overall equipment effectiveness for deep water disposal pump using ANNGA analysis approach / Soud Al-Toubi, Babakalli Alkali, David Harrison and Sudhir C.... by Al Toubi, Soud, Harrison, David, C.V., Sudhir

    Published 2023
    “…Analysis of ANOVA (variance) was adopted as an additional decision tool for detecting the variation of process parameters. ANN-GA results showed that the current OEE value ranges between 29% to 54%, whereas the predicted future system performance average is approximately 49%, which reflects the poor performance of the DWD pump system in the future compared to the worldclass target (85%). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…For comparison purpose, the other approach of counting trees was carried out; the commercial eCognition software was tested for oil palm counting in template matching approach. The overall accuracy of counting existing oil palm trees using the approach developed in this study is 93.3% while missing trees detection gives the detection accuracy of 89.2%. …”
    Get full text
    Get full text
    Thesis