Search Results - (( simulation detection based algorithm ) OR ( program implementation using algorithm ))

Refine Results
  1. 1

    IMAGE PROCESSING ALGORITHMS ON FPGA by MOHAMED SHUKOR, MOHAMED NASIR

    Published 2007
    “…The objective of this project is to construct a real time hardware image processing system which based on Field Programmable Gate Array (FPGA). The chosen image processing algorithms are implemented on two systems which are Color Filtering System and Edge Detection System. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
    Get full text
    Get full text
    Article
  3. 3

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…In this thesis, a user authentication program is modeled and simulated using Network simulator2 (NS2). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Self routing traffic light for traffic light controller using priority method based on volume of vehicles by Tan, Swee Tiang

    Published 2015
    “…With the primary data provided, Simulation of Urban Mobility (SUMO) is used to create traffic simulation for different types of situation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication by Ab Ghani, Mohd Ruddin, Wan Hassan, Wan Ahmas Redhauddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar

    Published 2013
    “…The results are then communicated between hardware circuit and simulation circuit for the final conclusion with the properly functional algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…The simulator allows a user through a GUI to select a March based test algorithm depending on the desired fault coverage and diagnostic resolution. …”
    Get full text
    Get full text
    Article
  9. 9

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An efficient fault syndromes simulator for SRAM memories by Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2009
    “…The simulator allows a user through a GUI to select a March based test algorithm depending on the desired fault coverage and diagnostic resolution. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Comparative study of clustering-based outliers detection methods in circular-circular regression model by Siti Zanariah Satari, Nur Faraidah Muhammad Di, Yong Zulina Zubairi, Abdul Ghapor Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Comparative study of clustering-based outliers detection methods in circularcircular regression model by Siti Zanariah, Satari, Nur Faraidah, Muhammad Di, Yong Zulina, Zubairi, Abdul Ghapor, Hussin

    Published 2021
    “…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    Article
  19. 19
  20. 20