Search Results - (( using function methods algorithm ) OR ( basic detection based algorithm ))

Refine Results
  1. 1

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS by Adoum, Bakhit Amine Adoum

    Published 2011
    “…Various multi resolution techniques are used that include wavelet based spectrum estimation and spectral hole detection, wavelet based multi-resolution in analog domain and multi-resolution multiple antenna based detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…A novel feature extraction algorithm was developed to extract the feature vectors. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process by Muhammad Adam, Zahari

    Published 2017
    “…The tracking algorithm determines the angles which are used to determine the position of solar tracker. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian by Tey, Siew Kian

    Published 2009
    “…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin by AmirHussin, 'Afina

    Published 2019
    “…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  14. 14

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system by M.H., Ali, Mohamad, Fadlizolkipi, Ahmad Firdaus, Zainal Abidin, Nik Zulkarnaen, Khidzir

    Published 2018
    “…Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item