Search Results - (( processes detection method algorithm ) OR ( processes specification method algorithm ))

Refine Results
  1. 1

    Fast temporal video segmentation based on Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H., Al-Haddad, Syed Abdul Rahman, Saripan, M. Iqbal, Mahmood, Basheera M., Hussien, Aseel

    Published 2020
    “…TVS algorithm design is still challenging because most of the recent methods are unable to achieve fast and robust detection. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The proposed method is found to be useful to tackle the limitations of the existing methods and serve TVS process efficiently.…”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…Efficient process fault detection and diagnosis in processes is important to reduce the cost of producing products with undesired specifications. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…This advantage is useful in systematically detect failures in process plant. Therefore, an algorithm for the development of process fault detection system in dynamic processes using artificial neural network (ANN) is presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A study on channel coding for 5G / Xu Wei by Xu , Wei

    Published 2019
    “…Channel coding is the process of error detection and correction. At present, 3GPP has standardized specifications for channel coding in the 5G NR eMBB scenario, LDPC code is adopted as a channel coding method for data information, and Polar code is adopted for control information encoding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…In this paper, an improved method for intrusion detection for binary classification was presented and discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Vader lexicon and support vector machine algorithm to detect customer sentiment orientation by Vivine Nurcahyawati, ., Zuriani, Mustaffa

    Published 2023
    “…Methods: This study employs a method to compare the classification performance of the Vader lexicon annotation process with manual annotation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Deep learning object detector using a combination of Convolutional Neural Network (CNN) architecture (MiniVGGNet) and classic object detection algorithm by Ismail, Asmida, Ahmad, Siti Anom, Che Soh, Azura, Hassan, Mohd Khair, Harith, Hazreen Haizi

    Published 2020
    “…The performance of this method can work in some specific use cases and effectively solving the problem of the inaccurate classification and detection of typical features.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Fault detection and diagnosis for gas density monitoring using multivariate statistical process control by Norul Shahida, Che Din, Noor Asma Fazli, Abdul Samad, Chin, Sim Yee

    Published 2011
    “…Therefore, an efficient fault detection and diagnosis algorithm needs to be developed to detect faults that are present in a process and pinpoint the cause of these detected faults. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…Many of the present network visitors’ analysis have the capability to capture extraordinary forms of traffics. The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…Results show that the defect detection algorithm able to detect defect only on the scratch area and able to read the Ga value at detected scratch line and transform it to surface roughness measurement at considerably good level of accuracy compared with manual method. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Drone Based Image Processing For Precision Agriculture by Sharif, Muhammad Arif Syafiq Md

    Published 2019
    “…Detection of plant disease using automated image processing method is beneficial as it can reduce huge work of monitoring in big farms comprising of numerous crops. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…In addition, a method of utilizing Convolutional Neural Network (CNN) is used for the detection of vehicles from roadway camera outputs to apply video processing techniques and extract the desired information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…This information can be processed, analyzed, and transformed into inputs for a decisional algorithm that controls the sprayer nozzle action in real-time. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The experimental results demonstrate the superior classification performance of the proposed methods over the previous methods. Specifically, the proposed method achieved 99.95% and 100.00% classification accuracy on the UECFOOD-100 and UNICT-FD1200 datasets, respectively, whereas previous methods have only been able to achieve 79.20% and 85.01% on the same datasets. …”
    Get full text
    Get full text
    Thesis
  20. 20