Search Results - (( using selection method algorithm ) OR ( based constructing detection algorithm ))

Refine Results
  1. 1

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  5. 5

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
    Get full text
    Get full text
    Article
  6. 6

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…For Method 2, suitable solid DBs are used to provide higher fault coverage instead of using the existing MTA. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain by Ong, Pauline, Tieh, Tony Hieng Cai, Lai, Kee Huong, Lee, Woon Kiow, Ismon, Maznan

    Published 2019
    “…For this purpose, this study used the intensification and diversification properties of the recently proposed moth-flame optimisation (MFO) algorithm and utilised the algorithm in the proposed feature selection scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…Therefore, the MSS-CA-CFAR is chosen to implement by practical digital circuit and there is another important feature in the MSS-CFAR algorithm that is parallel processing since the spike selection process is done at the same time with summing of samples process that makes this algorithm much less in processing time from any other algorithm using the same environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.] by Wang, Jie, Mohd. Shah, Mohd. Kamal, Choong, Wai Heng, Al-Azad, Nahiyan

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Article
  11. 11

    Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks by Wang Jie, Mohd. Kamal Mohd. Shah, Choong Wai Heng, Nahiyan Al-Azad

    Published 2024
    “…Simulated data are generated using ANSYS software by using models of semi-circular defects in steel pipes, producing magnetic leakage signals of varying intensities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  14. 14

    Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis by Muhammad Hanafi, Yusop, Ghazali, M. F., Mohd Fadhlan, Mohd Yusof, Muhammad Aminuddin, Pi Remli

    Published 2021
    “…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Obstacle detection for Unmanned Aerial Vehicle (UAV) by Abdul Khaliq, Nor Aizatul Nabila, Ramli, Muhammad Faiz

    Published 2022
    “…In algorithm development and filtration is used to improve the accuracy of the feature matching process, which is required for classifying the obstacle region and free region of any texture obstacle. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  17. 17

    Automatic recognition of freshwater algae (Oscillatoria sp.) using image processing techniques with artificial neural network approach / Awatef Saad Salem Saad by Salem Saad, Awatef Saad

    Published 2012
    “…Computer-based image analysis and pattern recognition methods were used to construct a system that is able to identify, and classify selected Cyanobacteria genus automatically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Delamination in fiberglass pre-impregnated laminated composites from ultrasonic a-scan signal using artificial intelligence by Mahmod, Muhammad Faisal

    Published 2018
    “…Besides affected the material strength and structural reliability, this failure mode normally present minor damage on the surface but the internal damage may extensive. Existing detection method using static and dynamic load response have limitations that are considered static based monitoring and require the sensor to be attached to the test specimen surface. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis