Search Results - ((detection algorithm) OR (((conversion algorithm) OR (generation algorithm))))

Refine Results
  1. 1

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    AUTOMATED GUIDED ROBOT (AGR) by Abd Rahim, Mohd Azlan Shah

    Published 2007
    “…This project concerns the design and fabrication of the Automated Guided Robot (AGR) prototype, utilizing artificial intelligence (AI) and genetic algorithm (GA) as a mainframe in helping the robot to generate a self-understanding of the area of work and mobilization to a destination desired by the user. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    On the Identification of FOSD-based Non-zero Onset Speech Dataset by Tran, D.C., Ibrahim, R.

    Published 2020
    “…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…Similar processes are used in the generation and embedding phases of a watermark. The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The Fuzzy Logic Approach for Modelling Object Physical Features and Holes Occupancies by Syed Abdul Hamid , Syed Mohamad Shazali, Sulaiman , Marizan, Said, Mohamed Azmi

    Published 2008
    “…There are four major algorithms involved. They are known as coloured balls detection, holes recognition, cupboard’s holes’ position modelling and pixel coordinate system (PCS) to robot coordinate system (RCS) conversion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning by Sia, Ken Yen

    Published 2022
    “…The project will use natural language processing in extracting certain features as the input of an algorithm to generate a reputation score that will be trained using machine learning to build the detection model. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…Active detection algorithm generates disturbances at the output by Positive feedback and Continuous feedback signal injection which is based on DQ implementation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…The accuracy of the algorithm developed in detecting tumour is 94.38% showing that it is relevant for use by radiologists. …”
    Get full text
    Get full text
    Monograph
  11. 11

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Generation of new low-complexity March algorithms for optimum faults detection in SRAM by Jidin, Aiman Zakwan, Hussin, Razaidi, Lee, Weng Fook, Mispan, Mohd Syafiq, Zakaria, Nor Azura, Loh, Wan Ying, Zamin, Norshuhani

    Published 2023
    “…A high-complexity test algorithm like the March MSS (18N) can guarantee the detection of all unlinked static faults in SRAM. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A comparative evaluation on data transformation approach for artificial speech detection by Choon Beng Tan, Mohd Hanafi Ahmad Hijazi

    Published 2024
    “…Despite these advancements, Automatic Speaker Verification (ASV) systems remain vulnerable to spoofing, particularly with artificial speech generated swiftly using advanced speech synthesis and voice conversion algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  18. 18

    Open phase fault-tolerant support vector machine predictive power control for six-phase induction generator WECS by Hamoudi Y., Abdolrasol M.G.M., Amimeur H., Hassaini F., Ker P.J., Ustun T.S.

    Published 2025
    “…Importantly, this approach does not require reconfiguring the control algorithm while preserving the system?s effective performance. …”
    Article
  19. 19

    Fault detection with optimum March test algorithm by Zakaria, Nor Azura, Wan Hassan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Xiao, Qing Wen

    Published 2013
    “…The automation hardware was designed to give the flexibility to the user to generate other new March Algorithm prior to the selected algorithm and analyzed the performance in terms of fault detection and power consumption.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
    Get full text
    Get full text
    Monograph