Search Results - (( problem deviation detection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    A self-contained real-time angle deviation detection and measurement technique for straight line quadrocopter navigation using accelerometer / Nor Hashim Mohd Arshad … [et al.] by Mohd Arshad, Nor Hashim, Abdul Razak, Noorfadzli, Adnan, Ramli, Misnan, Mohamad Farid, M. Thamrin, Norashikin

    Published 2014
    “…This project proposes a new real-time adaptive trajectory correction algorithm for quadrocopter, which could specifically detect angle deviation through the use of accelerometer to allow for corrective action.…”
    Get full text
    Get full text
    Get full text
    Book Section
  2. 2

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…This paper focuses on a graph-based approach for text representation and presents a novel error tolerance dissimilarity algorithm for deviation detection. We resolve two non-trivial problems, i.e. semantic representation of text and the complexity of graph matching. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of a computer vision-based technique for analysis of hand therapy exercise by Muhammad Zabri, Abu Bakar

    Published 2018
    “…For this purpose, the ROM exercise was developed by using the hand detection and tracking, fingertips detection, skeleton joints detection algorithms and joint angle measurement algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Gait pattern detection for amputated prosthetic using fuzzy algorithm by Abdullah, Ahmad Faisal

    Published 2015
    “…The work included in this project focuses on developing a system to measure the angular displacement of human joint of lower part with patients having this problem and then applying gait phase detection using intelligent algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Reactive approach for automating exploration and exploitation in ant colony optimization by Allwawi, Rafid Sagban Abbood

    Published 2016
    “…Ant colony optimization (ACO) algorithms can be used to solve nondeterministic polynomial hard problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Automated visual defect detection using deep learning by Loh, Xiao

    Published 2022
    “…The main goal of this project is to study and develop various automated defect detection models by utilizing state-of-the-art deep learning segmentation algorithms, including U-Net, Double U-Net, SETR, TransU-Net, TransDAU-Net, CAM and SEAM to perform semantic segmentation in fully supervised and weakly supervised learning manners. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Modified sequential fences for identifying univariate outliers by Wong, Hui Shein

    Published 2016
    “…Ultimately, the utilisation of in sequential fences seems to demonstrate a comparable accuracy in detecting the contaminated data. We have shown that GSF approach effectively reduce the masking and swamping problems in identifying the outliers. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Text anomaly detection identifies deviating information from general information contained in documents. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment by Jianhong, Mei

    Published 2019
    “…To evaluate the performance of the proposed method, the average and variance error deviation are calculated. The Euclidean distances of detected lines from ground truth are used to compare the accuracy of the proposed method. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…Application in real data also shows that the proposed clustering method for this linear functional relationship model successfully detects the outliers, thus suggesting the method’s practicality in real-world problems.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Early detection of spots high water saturation for landslide prediction using thermal imaging analysis by Ghazali, K. H., Mohd Falfazli, Mat Jusof, Muhammad, Badaruddin, Jadin, Mohd Shawal

    “…Hence, to solve this issue, this study investigates a new method to detect water saturation spots which is integrated with a thermal image camera to provide early detection of landslide. …”
    Get full text
    Get full text
    Research Report
  19. 19

    Detection And Identification Of Stiction In Control Valves Based On Fuzzy Clustering Method by Daneshwar, Muhammad Amin

    Published 2016
    “…This modification prevents the fuzzy clustering algorithm from turning into numerical problem. A method, which gain benefits from the idea that in the presence of stiction, the cluster centers of main regions of flow control loops are deviated from their origin, is proposed to detect the deviation (detection). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…The accuracy value shows that the KNN algorithm is better when compared to the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis