Search Results - (( solution detection method algorithm ) OR ( problem implementation based algorithm ))
Search alternatives:
- problem implementation »
- implementation based »
- solution detection »
- method algorithm »
-
1
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
2
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…Children abandoned in vehicles is a critical issue that has led to numerous fatal injuries worldwide. To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
4
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…However, it is difficult to generate fuzzy parameter manually when applied on complex problem. To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
7
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
Published 2020“…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
Get full text
Get full text
Thesis -
8
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…However, CBR cannot provide solutions to unanticipated or unknown problems. Therefore, further investigation of the retrieval and revision mechanisms of CBR is essential in improving the diagnosis accuracy and precision of the method. …”
Get full text
Get full text
Article -
9
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Cluster Heads (CHs), selected through a range of metrics, are responsible for data aggregation and transmission to the Base Station (BS). Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
Article -
10
Optimal resource allocation for NOMA wireless networks
Published 2022“…The major goal is to maximize the users’ maximum weighted sum rate. The suggested algorithm’s most notable feature is that it converges to the global optimal solution. …”
Get full text
Get full text
Article -
11
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…In the developed algorithm, a Newton divided difference interpolation has been used in approximating a non-vanishing delay, whilst a new approach that is based on an adaptation of predictor-corrector scheme has been used to handle the vanishing delay problems. …”
Get full text
Get full text
Thesis -
12
Image processing on intel edison microcontroller for pork detection
Published 2016“…In this research, implementing image processing techniques based on Intel Edison platform is used to handle CVD problem and decrease the detection cost. …”
Get full text
Get full text
Thesis -
13
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…Related work was surveyed in digital watermarking, cryptography and design methodology before implementing the text based watermarking method (embedded and extract/detection of watermarks).The implementation results on text based digital watermarking combined with cryptographic techniques are presented. …”
Get full text
Get full text
Get full text
Thesis -
14
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
Get full text
Get full text
Thesis -
15
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Design and implementation of a deep learning based hand gesture recognition system for Rehabilitation Internet-Of-Things (RIOT) environments using MediaPipe
Published 2025“…The methodology involves the integration of MediaPipe for detecting hand landmarks and adaptive sensitivity algorithms to ensure reliable recognition across different environments, such as varying lighting and hand positions. …”
Get full text
Get full text
Get full text
Article -
18
A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method
Published 2018“…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
Get full text
Get full text
Get full text
Article -
19
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article
