Search Results - made ((selection algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
    Get full text
    Get full text
    Article
  4. 4

    Weed recognition based on erosion and dilation segmentation algorithm by S., Sulaiman, M.H., Siddiqi, I., Ahmad

    Published 2009
    “…This algorithm can detect weeds and also classify it. Currently the algorithm is tested on two types of weeds i.e. broad and narrow. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system by Abdolee, Reza

    Published 2006
    “…A complexity comparison between two algorithms has been made in terms of number of mathematical operation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimized differential evolution algorithm for linear frequency modulation radar signal denoising by Al-Dabbagh, Mohanad Dawood Hasan

    Published 2013
    “…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  9. 9

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Optimized intrusion detection mechanism using soft computing techniques by Ahmad, iftikhar, Azween, Abdullah, Alghamdi, Abdullah, Hussain, Muhammad

    Published 2011
    “…So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
    Get full text
    Thesis
  14. 14

    Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain by Mohammad Asif , Hossain

    Published 2022
    “…In this thesis, local sensing results are produced by SUs or vehicles by selecting the best spectrum sensing technique. The selection would be made based on the hybrid machine learning (ML) algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Automated cone cut error detection of bitewing images using convolutional neural network by Mohamed Misbahou Mkouboi, Mohamed Moubarak, Olowolayemo, Akeem, Ghazali, Ahmad Badruddin

    Published 2023
    “…The deep learning method selected was Convolutional Neural Network (CNN), and the algorithm was used and trained to classify the cone cut error. …”
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Wet diaper detection and notification device to alert the baby caretaker by Burhannuddin, Dirman Hanafi, Mazlan, Sulaiman, Abdul Rahman, Hisyam, Abdul Rahim, Ruzairi

    Published 2022
    “…The methods of this study were divided into four phases including project design, algorithm development, hardware development, and performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Air quality measurement using remote sensing and digital images processing techniques / Lim, H. S. … [et al.] by Lim, H. S., Jafri, Mat, Abdullah, M. Z., Ahmad, A.N.

    Published 2004
    “…The algorithm used was based on the apparent reflectance values detected at near and far distances from the refence surface, and these in turn can be related to the concentration of the air pollutants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20