Search Results - made ((section algorithm) OR (detection algorithm))

Refine Results
  1. 1

    Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
    Get full text
    Get full text
    Book Section
  2. 2

    A state of the art comparison of databases for facial occlusion by Fatma Susilawati, Mohamad, Abdulganiyu, Abdu Yusuf, Zahraddeen, Sufyanu

    Published 2015
    “…The databases are useful for performing a rigorous benchmarking of face detection and recognition algorithms.…”
    Get full text
    Get full text
    Article
  3. 3

    Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad by Ahmad, Siti Arpah

    Published 2018
    “…The onset of digital imaging modality has made it possible to apply image processing algorithms to overcome the short comings of medical images such as noise, blurring and low contrast. …”
    Get full text
    Get full text
    Book Section
  4. 4

    A lightweight graph-based pattern recognition scheme in mobile ad hoc networks. by Raja Mahmood, Raja Azlina, Muhamad Amin, Anang Hudaya, Amir, Amiza, Khan, Asad I.

    Published 2012
    “…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
    Get full text
    Book Section
  5. 5

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi by Haris, Syahila Aina, Paidi, Zulfikri

    Published 2023
    “…As a consequence, tracking attendance information is made easier for student administration.…”
    Get full text
    Get full text
    Book Section
  7. 7
  8. 8

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
    Get full text
    Get full text
    Article
  9. 9

    A review of object detection in traffic scenes based on deep learning by Zhao, Ruixin, Tang, SaiHong, Supeni, Eris Elianddy, Abdul Rahim, Sharafiz, Fan, Luxin

    Published 2024
    “…It introduces techniques for optimizing object detection algorithms, summarizes commonly used object detection datasets and traffic scene datasets, along with evaluation criteria, and performs comparative analysis of the performance of deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Real time power quality event detection using continuous wavelet transform by Tan R.H.G., Ramachandaramurthy V.K.

    Published 2023
    “…This paper shows continuous wavelet transform performs in real time is made possible and it is a promising signal processing algorithm for power quality event detection application. � 2011 IEEE.…”
    Conference paper
  11. 11

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Final output of the algorithm summarise the bleeding detection for all patient in an excel file. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…The further improvements can be made through lighting design, adding image enhancement algorithm and decision algorithm.…”
    Get full text
    Get full text
    Monograph
  17. 17

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…This research introduces Adaptive Grid-Meshed-Buffer Stream Clustering Algorithm (AGMB), that addresses these weaknesses and improves outlier detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A feature-based approach for segmenting faces by Zaqout, I., Zainuddin, R., Baba, S.

    Published 2004
    “…Though numerous attempts have been made to detect and localize faces, these approaches have made assumptions that restrict their extension to more general cases. …”
    Get full text
    Get full text
    Article
  19. 19

    Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
    Get full text
    Get full text
    Thesis