Search Results - (( simulation utilisation detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- simulation utilisation »
- utilisation detection »
- implication based »
- java implication »
-
1
Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection
Published 2024“…The proposed model leverages machine learning algorithms for autonomous detection of insulators. To determine the optimal stopping point and safety distance between the UAV and the insulator, a mathematical model is presented that utilises the captured images and the machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection
Published 2019“…A program has been developed in C++ to execute the simulation of a head imaging. The simulation consists of two main techniques; a FDTD technique for computational electromagnetics, and Forward-Backward Time-Stepping (FBTS) technique, an algorithm to solve inverse problems. …”
Get full text
Get full text
Get full text
Thesis -
3
Single-linkage method to detect multiple outliers with different outlier scenarios in circular regression model
Published 2018“…Single-linkage is one of the algorithms in agglomerative clustering technique that can be used to detect outliers. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…This experiment utilised actual cryptojacking samples and achieved a 100 percent detection accuracy rate in simulation.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Modified sequential fences for identifying univariate outliers
Published 2016“…Sequential fences method is modified by replacing interquartile range with various robust scales such as semi-interquartile range, , median absolute deviation ( ) and Gini’s mean difference ( ) in order to improve outlier detection in symmetric distribution. Ultimately, the utilisation of in sequential fences seems to demonstrate a comparable accuracy in detecting the contaminated data. …”
Get full text
Get full text
Thesis -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
Identification and mitigation of non-line-of-sight path effect using repeater for hybrid ultra-wideband positioning and networking system
Published 2021“…From the simulation results, the NLOS paths have been successfully identified under the NLOS environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
