Search Results - different ((electron algorithm) OR (detection algorithm))

Refine Results
  1. 1

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…An algorithm for the design object detection systems is presented. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Driver drowsiness detection using different classification algorithms by Nor Shahrudin, Nur Shahirah, Sidek, Khairul Azami

    Published 2020
    “…Hence, this paper present and prove the reliability of ECG signal for drowsiness detection in classifying high accuracy ECG data using different classification algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images by Elaraby, Ahmed, Al-Ameen, Zohair

    Published 2022
    “…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
    Get full text
    Get full text
    Article
  7. 7

    The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition by Othman, Mahmod, Syed Abdullah, Sharifah Lailee, Ahmad, Khairul Adilah, Abu Bakar, Mohd Nazari, Mansor, Ab Razak

    Published 2016
    “…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
    Get full text
    Get full text
    Article
  9. 9

    Development of pose estimation algorithm for Quranic Arabic word by Mohd Esa, Luqman Naim, Morshidi, Malik Arman, Mohd Zailani, Syarah Munirah

    Published 2018
    “…The algorithms are combined with each other to provide four different techniques to estimate the pose of Quranic Arabic words. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    High impedance fault detection and identification based on pattern recognition of phase displacement computation by Ali, Mohd Syukri, Bakar, Ab Halim Abu, Tan, Chia Kwang, Arof, Hamzah, Mokhlis, Hazlie

    Published 2018
    “…This paper proposes a new algorithm for high-impedance-fault (HIF) detection based on phase displacement computation (PDC). …”
    Get full text
    Get full text
    Article
  11. 11

    A traffic signature-based algorithm for detecting scanning internet worms by M. Rasheed, Mohammad, Ghazali, Osman, Md Norwawi, Norita, M. Kadhum, Mohammed

    Published 2009
    “…The proposed method has two algorithms. The first part is an Intelligent Failure Connection Algorithm (IFCA) using Artificial Immune System; IFCA is concerned with detecting the internet worm and stealthy worm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Fire Detection Algorithm using Image Processing Techniques by Poobalan, Kumarguru, Liew, Siau-Chuin

    Published 2015
    “…After analysing 50 different fire scenarios images, the final accuracy obtained from testing the algorithm was 93.61% and the efficiency was 80.64%.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An Algorithm for Vehicle Detection and Tracking by Malik , Aamir Saeed

    Published 2010
    “…In this paper, we propose a vehicle detection and tracking algorithm. The detection is done using the median filtering and blob extraction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Fast temporal video segmentation based on Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H., Al-Haddad, Syed Abdul Rahman, Saripan, M. Iqbal, Mahmood, Basheera M., Hussien, Aseel

    Published 2020
    “…In this regard, this paper proposes a TVS algorithm with high precision and recall values, and low computation cost for detecting different types of video transitions. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Automated intruder detection from image sequences using minimum volume sets by Ahmed, Tarem, Wei, Xianglin, Ahmed, Supriyo, Pathan, Al-Sakib Khan

    Published 2012
    “…Through application to image sequences from two different scenarios and comparison with existing algorithms, we show that it is possible for our proposed algorithm to easily obtain high detection accuracy with low false alarm rates. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
    Get full text
    Article
  17. 17

    Printed circuit board inspection using wavelet-based technique by Ibrahim, Zuwairie

    Published 2002
    “…The defect is detected by utilizing wavelet-based image difference algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of real-time pose estimation algorithm for Quranic Arabic word by Mohd Esa, Luqman Naim, Morshidi, Malik Arman, Mohd Zailani, Syarah Munirah

    Published 2017
    “…The algorithms are combined with each other to provide four different techniques to estimate the pose of Quranic Arabic words. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article