Search Results - (( program implementation developing algorithm ) OR ( data detection method algorithm ))

Refine Results
  1. 1

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The highest accuracy is 78.33% ofthe 10-fold Cross Validation method are found in data is 80% training and 20% testing when k is equal to 5. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…The shortest distance is defined as best result. A set of data contains position of marbles is tested for ACO algorithm in the prototype. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Fuzzy speed controller for DC motor drives by Muhammad Izzuddin, Jaafar

    Published 2013
    “…Clanguage programming will be used as assemble language for programming and develop the algorithm and interface.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Performance comparison of various YOLO architectures on object detection of UAV images by Gunawan, Teddy Surya, Mahmoud Ismail, Islam Mohamed, Kartiwi, Mira, Ismail, Nanang

    Published 2022
    “…Current Unmanned Aerial Vehicles (UAVs) applications in transportation systems encourage the development of object detection methods to collect real-time traffic data using UAVs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Design and development of bi-directional two stage battery charger for dual PV-grid by Yusoff Shazilly, Muhammad Imran

    Published 2017
    “…The implementation of Arduino software and libraries in AVR microcontroller significantly reduce the complexity of programming in order to create signals which provides charging algorithm and detects current and voltage for the charging circuit. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Image processing on intel edison microcontroller for pork detection by Khdhair, Zaid Hadi

    Published 2016
    “…Recently, the researchers have demonstrated that it is essential to develop inexpensive, and reliable methods to support halal food detection systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian by Tey, Siew Kian

    Published 2009
    “…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Implementation of autonomous vehicle navigation algorithms using event-driven programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  17. 17

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The functionality of the algorithm is first verified in Matlab, simulating the expected output of the system before implementing it onto the FPGA development board. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
    Get full text
    Get full text
    Thesis