Search Results - made ((function algorithm) OR (detection algorithm))
Search alternatives:
-
1
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
2
Integrated face detection approach for far image application
Published 2016“…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
Get full text
Get full text
Thesis -
3
Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain
Published 2020“…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
Get full text
Get full text
Thesis -
4
-
5
Combined generative adversarial network and fuzzy C-means clustering for multi-class voice disorder detection with an imbalanced dataset
Published 2020“…To explain the necessity of CGAN and IFCM, a comparison is made between the algorithm with CGAN and that without CGAN. …”
Get full text
Get full text
Article -
6
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…The overall image analysis technique involves the following algorithms: image acquisition (capturing of images), processing (thresholding, noise filtering and boundary detection) and recognition (force measurement). …”
Get full text
Get full text
Thesis -
7
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
Get full text
Thesis -
8
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…The collaboration algorithms are design to go through five main phases in order to continuously monitor and detect any deviations from the processes currently running at the vacinity of the members. …”
Get full text
Get full text
Get full text
Article -
9
Identifying multiple outliers in linear functional relationship model using a robust clustering method
Published 2023“…In this study, we propose an efficient clustering procedure to identify multiple outliers in the linear functional relationship model using the single linkage algorithm with the Euclidean distance as the similarity measure. …”
Get full text
Get full text
Get full text
Article -
10
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A study on component-based technology for development of complex bioinformatics software
Published 2004“…From the enriched GO tree, the BTreeBicluster algorithm is applied during the clustering process. …”
Get full text
Get full text
Monograph -
13
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
14
Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim
Published 2019“…By applying this algorithm, LoveHealth is able to detect critical glucose reading, which are inputted by the patients manually, or heartrate readings captured from the patients' smartwatch, and notifies their respective caregivers, informing them that they require medical attention. …”
Get full text
Get full text
Thesis -
15
Structural steel plate damage detection using DFT spectral energy and artificial neural network
Published 2011Get full text
Working Paper -
16
Intersection Features For Android Botnet Classification
Published 2019“…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. The proposed approach used requested permissions in the Android app and API function as features to differentiate between the Android botnet apps and benign apps. …”
Get full text
Get full text
Get full text
Article -
17
MOBILE ROBOT
Published 2004“…These are to be achieved by Voronoi Diagram or Delaunay Triangulation method for mapping, and a combination of one or more of the Dijkstra, Bellman, Ford, Moore, Johnson, Floyd-Warshal, or A* algorithms for best path calculation. In some parts of the project especially the intelligent navigation algorithms, the author encountered many new ideas and theories which the author cannot fully understand. …”
Get full text
Get full text
Final Year Project -
18
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…The invention of smartphone have made life easier as it is capable of providing important functions used in user's daily life. …”
Proceedings Paper -
19
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…This study presents a merged traceability module of GPS tracking system technology with geofence algorithm, entitled the Halal tracer. The significance of Halal tracer traceability module is that it mainly benefits in providing automatic detection on the spatial activity undergone during the shipment process of the Halal goods. …”
Get full text
Get full text
Thesis -
20
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project
