Search Results - (( using vector method algorithm ) OR ( using action method algorithm ))

Refine Results
  1. 1

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…For both indoor and outdoor scene, the proposed algorithm outperforms the other methods with accuracy 97% and 100%. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Use of base case Jacobians in power flow solution under topological changes by Ahmed, S. Shahnawaz, Rahman, Md. Mizanur

    Published 2002
    “…Fast decoupled Newton-Raphson method is the most widely used algorithm for load flow analysis needed in on-line assessment of the steady state security of a power system. …”
    Get full text
    Get full text
    Article
  3. 3

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…After the feature extraction stage, Support Vector Machine (SVM) is used to classify the transient disturbance waveforms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy by Ahmad Tarusan, Siti Azura

    Published 2022
    “…A five-level cascaded H-bridge (CHB) inverter was used in the optimal DTC switching strategy because it had many voltage vectors and could be used for a variety of speed operations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…In recent years, several Android malware applications were developed to perform certain illegitimate activities and harmful actions on mobile devices. In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Space vehicles dynamics and control by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…New techniques for estimating the angular velocity without rate sensors using only vector or quaternion measurement developed via Kalman filtering have been introduced and discussed. …”
    Get full text
    Get full text
    Get full text
    Book
  9. 9
  10. 10
  11. 11

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…For example, in video compression, the use of motion vectors on individual macro-blocks optimized the motion vector information. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12
  13. 13
  14. 14

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…The eigenfaces is projected onto human faces to identify the features vector. These significant features vector are further refine using Gaussian kernel. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system by M. W., Mustafa, H., Shareef, M. H., Sulaiman, S. N., Abd. Khalid, S. R., Abd. Rahim, Omar, Aliman

    Published 2011
    “…This paper proposes a new method to trace the transmission loss in deregulated power system by applying Genetic Algorithm (GA) and Least Squares Support Vector Machine (LS-SVM). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
    Conference Paper
  18. 18

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A Method For Solving Mult-Objective Optimization Problem: Vector Evaluated Genetic Algorithm (Vega) by Tan, Tun Tai

    Published 2009
    “…However, it is impractical to solve MOOP by using classical methods due to its complexity. Genetic Algorithms (GAs) are a powerful stochastic search in solving optimization problems. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    A Study On The Effects Of Noise Level, Cleaning Method, And Vectorization Software On The Quality Of Vector Data. by Al-Khaffaf, Hasan, Talib, Abdullah Zawawi, Salam, Rosalina Abdul

    Published 2007
    “…Noisy images are cleaned by six cleaning algorithms and then three different commercial raster to vector software are used to vectorize the cleaned images. vector Recovery Index (VRI) is the performance evaluation criteria used in this study to judge the quality of the resulting vectors compared to their ground truth data. …”
    Get full text
    Get full text
    Conference or Workshop Item