Search Results - (( user detection method algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1
  2. 2

    A multimodal biometric detection system via rotated histograms using hough lines by Fatma Susilawati, Mohamad, Zahraddeen, Sufyanu

    Published 2015
    “…The new system outperformed many methods in the literature reported using conventional detection methods. …”
    Get full text
    Get full text
    Article
  3. 3

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Segmentation of Retinal Vasculature using Active Contour Models (Snakes) by Pang, Kee Y ong

    Published 2009
    “…The results shows that the algorithm outperforms many other published methods and achieved an accuracy (ability to detect both vessel and non-vessel pixels) range of 0.92-0.94, a sensitivity (ability to detect vessel pixels) range of 0.91-0.95 and a specificity (ability to detect non-vessel pixels) range of0.78-0.85. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In a recent study, the analysis of pressure transient signals could be seen as an accurate and low-cost method for leak and feature detection in water distribution systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph
  10. 10

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…Extensive functional and user testing was performed to ensure the application not only accomplishes its goal but increases efficacy as well. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Leak Detection in Medium Density Polyethylene (MDPE) Pipe Using Pressure Transient Method by Makeen, Mohd Amin, M. F., Ghazali, N. F., Adnan

    Published 2015
    “…The data analysis of the pressure signal that then to be decomposed into a series of wave composition with the use of EEMD signal masking method by using the matrix laboratory (MATLAB) software. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Protection of integrity and ownership of pdf documents using invisible signature by Taha, Imad, Zeki, Akram M., Pathan, Al-Sakib Khan, makarim, rusydi

    Published 2012
    “…Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle by Chan, Shi Jing

    Published 2018
    “…The proposed method for the fault detection in this study uses hybrid technique which combines the extended kalman filter and artificial neural network (ANN). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Feature extraction and localisation using scale-invariant feature transform on 2.5D image by Suk, Ting Pui, Jacey-Lynn, Minoi, Terrin, Lim, Fradinho Oliveira, João, Fyfe Gillies, Duncan

    Published 2015
    “…In this paper, we present and discuss our new automatic landmarking method on face data using 2.5-dimensional (2.5D) range images. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The DBSCAN algorithm is used to perform the macro clustering task by replacing the distance between trajectories segments with the distance between the temporal micro-clusters. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection by Ahmad, Mohd Ashraf, Musa, Zulkifli, Zawawi, Mohd Anwar, Mohd Falfazli, Mat Jusof, Mohd Rashid, Muhammad Ikram, Suid, Mohd Helmi, Zaharuddin, Mohamed

    “…The SCA method is used to tune both coefficients in the nonlinear function and the transfer function of the Hammerstein model such that the error between the identified output and the real experimental output is minimized. …”
    Get full text
    Get full text
    Research Report