Search Results - (( solution detection method algorithm ) OR ( problem implementation using algorithm ))

Refine Results
  1. 1

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…Children abandoned in vehicles is a critical issue that has led to numerous fatal injuries worldwide. To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…However, it is difficult to generate fuzzy parameter manually when applied on complex problem. To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…In the developed algorithm, a Newton divided difference interpolation has been used in approximating a non-vanishing delay, whilst a new approach that is based on an adaptation of predictor-corrector scheme has been used to handle the vanishing delay problems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Image processing on intel edison microcontroller for pork detection by Khdhair, Zaid Hadi

    Published 2016
    “…In this research, implementing image processing techniques based on Intel Edison platform is used to handle CVD problem and decrease the detection cost. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions by Abbas O.K., Abdullah F., Radzi N.A.M., Salman A.D., Abdulkadir S.J.

    Published 2025
    “…Many clustered routing algorithms have been developed to address various issues like energy efficiency, network lifetime, and hotspot problems. …”
    Article
  14. 14

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…This could include for instance a systematic literature review on theories available to understand the current problem and its possible solution, analysis of the users need gathered from interviews, and of course the application development using Flutter within Visual Studio Code. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…Related work was surveyed in digital watermarking, cryptography and design methodology before implementing the text based watermarking method (embedded and extract/detection of watermarks).The implementation results on text based digital watermarking combined with cryptographic techniques are presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18
  19. 19

    A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method by Zalili, Musa, Mohd Hafiz, Mohd Hassin, Nurul Izzatie Husna, Fauzi, Rohani, Abu Bakar, Watada, Junzo

    Published 2018
    “…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Terrain awareness mobility model to support outdoor mobility for people with vision impairment by Yousef, Malkawi Abeer Dirar

    Published 2023
    “…TAM2 contains three main components; user model, terrain detection model, and learning model. For the prototyping phase, the study employed the deep learning detection framework YOLOv4-tiny algorithm to implement a real-time terrain detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis