Search Results - (( user detection method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- method algorithm »
- function method »
- user detection »
- using function »
-
1
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
2
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…The new system outperformed many methods in the literature reported using conventional detection methods. …”
Get full text
Get full text
Article -
3
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
Get full text
Get full text
Thesis -
5
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
6
-
7
Segmentation of Retinal Vasculature using Active Contour Models (Snakes)
Published 2009“…The results shows that the algorithm outperforms many other published methods and achieved an accuracy (ability to detect both vessel and non-vessel pixels) range of 0.92-0.94, a sensitivity (ability to detect vessel pixels) range of 0.91-0.95 and a specificity (ability to detect non-vessel pixels) range of0.78-0.85. …”
Get full text
Get full text
Final Year Project -
8
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…In a recent study, the analysis of pressure transient signals could be seen as an accurate and low-cost method for leak and feature detection in water distribution systems. …”
Get full text
Get full text
Thesis -
9
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
10
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…Extensive functional and user testing was performed to ensure the application not only accomplishes its goal but increases efficacy as well. …”
Get full text
Get full text
Thesis -
11
Leak Detection in Medium Density Polyethylene (MDPE) Pipe Using Pressure Transient Method
Published 2015“…The data analysis of the pressure signal that then to be decomposed into a series of wave composition with the use of EEMD signal masking method by using the matrix laboratory (MATLAB) software. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Protection of integrity and ownership of pdf documents using invisible signature
Published 2012“…Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Hybrid fault detection using kalman filter and neural network for quadrotor micro aerial vehicle
Published 2018“…The proposed method for the fault detection in this study uses hybrid technique which combines the extended kalman filter and artificial neural network (ANN). …”
Get full text
Get full text
Thesis -
14
Feature extraction and localisation using scale-invariant feature transform on 2.5D image
Published 2015“…In this paper, we present and discuss our new automatic landmarking method on face data using 2.5-dimensional (2.5D) range images. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Implementing a novel hybrid maximum power point tracking technique in DSP via Simulink/MATLAB under partially shaded conditions
Published 2016“…Moreover, this work presents the load sizing method for PSCs to avoid controller failure when detecting the GMPP. …”
Get full text
Get full text
Get full text
Article -
17
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The DBSCAN algorithm is used to perform the macro clustering task by replacing the distance between trajectories segments with the distance between the temporal micro-clusters. …”
Get full text
Get full text
Thesis -
18
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Existing machine learning models for sentiment analysis and suicide prediction lack a comprehensive user-friendliness system for the end users. Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis -
19
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
20
Development of fish cupula inspired multi-fluidic sensor for liquid slosh detection
“…The SCA method is used to tune both coefficients in the nonlinear function and the transfer function of the Hammerstein model such that the error between the identified output and the real experimental output is minimized. …”
Get full text
Get full text
Research Report
