Search Results - (( using function method algorithm ) OR ( based constructing detection algorithm ))

Refine Results
  1. 1

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  3. 3
  4. 4

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…This work demonstrated artificial sine signal constructed using Matlab software in order to identify the effectiveness and accuracy of this method. …”
    Get full text
    Get full text
    Article
  5. 5

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…This method is evaluated in terms of function and performance differences between the proposed MTA and existing MTA using the User Defined Algorithm (UDA) available in the MBISTArchitect tool. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis by Muhammad Hanafi, Yusop, Ghazali, M. F., Mohd Fadhlan, Mohd Yusof, Muhammad Aminuddin, Pi Remli

    Published 2021
    “…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa by Mustafa, Zarith Marissa

    Published 2015
    “…Another objective is to construct a prototype based on Kohonen (SOM) method to classify children with potential dysgraphia symptom whether it is high, medium or low potential. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Determining gender differential item functioning for mathematics in coeducational school culture by Shanmugam, S. Kanageswari Suppiah

    Published 2018
    “…Content validity was established by constructing a table of specifications. By employing the software WINSTEPS version 3.67.0 that is based on the Rasch Model for dichotomous responses, Differential Item Functioning analysis was conducted by using Mantel-Haenszel Chi-square method. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Leak localization using empirical mode decomposition and teager-kaiser energy operator analysis based on pressure transient signal: experimental study by Pi Remli, Mohd Aminuddin, Ghazali, M. F., Azmi, W. H., Mohd Yusof, M. F., M. Yusop, Hanafi, Azmi, M. L.

    Published 2019
    “…This paper focused on leak identification and localization using Teiger-Kaiser Energy Operator (TKEO) as instantaneous frequency analysis (IFA) while Empirical Mode Decomposition (EMD) as decomposition method with implementation of Integrated Kurtosis Algorithm for Z-Filter (Ikaz) to Kurtosis ratio as the automatic selection criterion for intrinsic mode function (IMF). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process by Muhammad Adam, Zahari

    Published 2017
    “…The tracking algorithm determines the angles which are used to determine the position of solar tracker. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    An automated pipeline for constructing 3D models of monogenean hardparts using machine learning technique for landmarks detection / Teo Bee Guan by Teo , Bee Guan

    Published 2019
    “…Researchers have been looking at alternative methods to assist them in their investigation on how monogeneans function. 3D models may aid researchers in studying morphology and function by rotating the 3D models in 360 degrees for 3D visualization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework by Abal Abas, Zuraida, Mohd Zaki, Nurul Hafizah, Asmai, Siti Azirah, Abdul Rahman, Ahmad Fadzli Nizam, Zainal Abidin, Zaheera

    Published 2019
    “…This paper proposed six steps model framework that aim: (1) To construct the nodes and vertices for temporal graph representing the relationship in supply chain network; (2) To propose an enhanced temporal community detection algorithm in graph analytics based on Cross-time approach and (3) To evaluate the enhanced temporal community detection algorithm in graph analytics for representing relationship in supply chain network based on external and internal quality analysis. …”
    Get full text
    Get full text
    Get full text
    Article