Search Results - (( user detection means algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…In time division-synchronous code division multiple access systems, the channel estimation for multiple subscribers requires the computation of very complicated algorithms through short training sequences. This situation causes mismodeling of the actual channels and introduces significant errors in the detected data of multiple users. …”
    Get full text
    Get full text
    Article
  3. 3

    Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems by Sabira, Khatun, Ali K., Marzook, Alyani, Ismail, Aduwati, Sali, Mohannad Hamed, Khalaf, Borhan, M. Ali

    Published 2012
    “…In time division-synchronous code division multiple access systems, the channel estimation for multiple subscribers requires the computation of very complicated algorithms through short training sequences. This situation causes mismodeling of the actual channels and introduces significant errors in the detected data of multiple users. …”
    Get full text
    Get full text
    Article
  4. 4

    Early detection of anxiety in social media using Convolution neural network / Mohd Tharwan Hadi Ruslan by Ruslan, Mohd Tharwan Hadi

    Published 2021
    “…But since most people need to stay at home, then by no mean detecting mental health patient will be difficult. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm by Sophian, Ali, Azmi, Nur Hanisah, Bawono, Ali Aryo

    Published 2021
    “…With the recent technological advancement, especially in machine vision and artificial intelligence, automated or semi-automated missing road lane marking detection systems can potentially be developed. In this work, preliminary study of the implementation of one of the latest deep learning algorithms, i.e. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    A hybrid framework based on neural network MLP and means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate.This paper provides the conceptual view and a general framework of the proposed system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Antenna arrays in multi-user detection of spread spectrum signals by Karim, M.R., Wei, S.

    Published 2007
    “…A number of multi-user detection algorithms have been suggested by various authors. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…In time division-synchronous code division multiple access systems, the channel estimation for multiple subscribers requires the computation of very complicated algorithms through short training sequences. This situation causes mismodeling of the actual channels and introduces significant errors in the detected data of multiple users. …”
    Get full text
    Get full text
    Article
  9. 9

    A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Polarization imaging for face spoofing detection: identification of black ethnical group by Abd Aziz, A.Z., Wei, H.

    Published 2018
    “…A newly proposed fusion formula which is named as the Mean-BC (MBC) has achieved higher detection accuracy rate and can be a robust face spoofing detection measure for polarized database consists of various ethnical groups.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Analysis of detection system for cover tape offset in the tap and reel process using neural net time series method by Khamil, Khairun Nisa, Rosli, Muhammad Irfan, Sulaiman, Siti Fatimah, Mohd Chachuli, Siti Amaniah, Isa, Ahmad Nizam

    Published 2025
    “…The findings of this research, including the analysis of training results, demonstrate the successful implementation of a reliable cover tape misalignment detection system. Notably, the Bayesian Regularization (BR) training algorithm outperformed the Scaled Conjugate Gradient (SCG) training algorithm for cover tape offset's predictive analysis, exhibiting lower Mean Squared Error (MSE) with 0.0015874 for BR compared to 0.0017839 for SCG, consistently lower Mean Absolute Error (MAE) values, stronger linear correlations, and superior overall performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…All the features of emphasized words detect by user is extracted. After detection of emphasized and non-emphasized words for speakerl and speaker2, intensity and pitch features need to be evaluated. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development of hippocampus MRI image segmentation algorithm for progression detection of alzheimer’s disease (AD) by Gilani Mohamed, Mohamed Ahmed

    Published 2022
    “…This study indicates developing an algorithm for detecting and progressing through the hippocampus of patients with Alzheimer's disease in MRI images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran by Amran, Aiman Syafwan

    Published 2023
    “…This system was put to two tests of testing which were functionality testing of the whole system and the metric evaluation of the object detection and classification model. The object detection and classification algorithm achieved 91.9% mean average precision in metric evaluation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    KM-NEU: an efficient hybrid approach for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia, Udzir, Nur Izura

    Published 2014
    “…The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown attacks. …”
    Get full text
    Get full text
    Article
  16. 16

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Twitter is increasingly investigated as a means of detecting mental health status, including depression and suicidality, in the population. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing navigation for the visually impaired: a Mamdani type 1 fuzzy logic approach to obstacle detection by Ibharim, Aisyah, Toha, Siti Fauziah, Nordin, Nor Hidayati Diyana, Mohammad O., Tokhi

    Published 2025
    “…Most previous research has focused on image detection algorithms for assistive devices, but they are less reliable in poor visibility and sensitive to environmental conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Real-time Personal Protective Equipment (PPE) compliance detection system using you only look once version 5 / Nur Amielia Natasha Mohamad Nazli by Mohamad Nazli, Nur Amielia Natasha

    Published 2023
    “…The project utilizes the You Only Look Once (YOLO) algorithm as the detection algorithm, namely version 5. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20