Search Results - made ((function algorithm) OR (detection algorithm))

Refine Results
  1. 1

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain by Mohamad Zain, Muhammad Asyraf

    Published 2020
    “…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset by Chui, K.T., Lytras, M.D., Vasant, P.

    Published 2020
    “…To explain the necessity of CGAN and IFCM, a comparison is made between the algorithm with CGAN and that without CGAN. …”
    Get full text
    Get full text
    Article
  6. 6

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
    Get full text
    Thesis
  8. 8

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…In this study, we propose an efficient clustering procedure to identify multiple outliers in the linear functional relationship model using the single linkage algorithm with the Euclidean distance as the similarity measure. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm by Ayman Khallel Al-ani, Shams Ul Arfeen Laghari, Hariprasath Manoharan, Shitharth Selvarajan, Mueen Uddin

    Published 2023
    “…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim by Ismail Hashim, Mohd Izzat

    Published 2019
    “…By applying this algorithm, LoveHealth is able to detect critical glucose reading, which are inputted by the patients manually, or heartrate readings captured from the patients' smartwatch, and notifies their respective caregivers, informing them that they require medical attention. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. The proposed approach used requested permissions in the Android app and API function as features to differentiate between the Android botnet apps and benign apps. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    MOBILE ROBOT by ABU KASSIM, ABU MASNUR

    Published 2004
    “…These are to be achieved by Voronoi Diagram or Delaunay Triangulation method for mapping, and a combination of one or more of the Dijkstra, Bellman, Ford, Moore, Johnson, Floyd-Warshal, or A* algorithms for best path calculation. In some parts of the project especially the intelligent navigation algorithms, the author encountered many new ideas and theories which the author cannot fully understand. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept by Madihah Mohd Saudi, Farida Hazwani Mohd Ridzuan, Nurlida Basir, Nur Fatin Nabila Mohd Rafei Heng, Sakinah Ali Pitchay, Ahmad, IN

    Published 2024
    “…The invention of smartphone have made life easier as it is capable of providing important functions used in user's daily life. …”
    Proceedings Paper
  19. 19

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project