Search Results - mode ((((electron algorithm) OR (selection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…An improved version of Salp Swarm Algorithm (ISSA) is proposed in this study to solve feature selection problems and select the optimal subset of features in wrapper-mode. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals by Faradila, Naim, Mahfuzah, Mustafa, Norizam, Sulaiman, Zarith Liyana, Zahari

    Published 2022
    “…Hence, a simplified feature selection method is necessary. This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Dual-layer ranking feature selection method based on statistical formula for driver fatigue detection of EMG signals by Faradila, Naim, Mahfuzah, Mustafa, Norizam, Sulaiman, Zarith Liyana, Zahari

    Published 2022
    “…Hence, a simplified feature selection method is necessary. This work proposed a dual-layer ranking feature selection algorithm based on statistical formula f EMG signals for driver fatigue detection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Fast mode decision algorithm by Maarif, Haris Al Qodri, Gunawan, Teddy Surya, Khalifa, Othman Omran

    Published 2011
    “…Fast mode decision is the developed algorithm intended for selectively choosing the mode decision used by the encoder. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    An efficient detection model of selective forwarding attacks in wireless mesh networks by Khanam, Shapla, Saleem, Habibullah Yusuf, Pathan, Al-Sakib Khan

    Published 2012
    “…In our approach, we also propose a multi-hop acknowledgement based algorithm to analyze and detect the malicious behavior to defend against selective forwarding attacks in WMNs. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Defect detection based on extreme edge of defective region histogram by Wakaf, Zouhir, Jalab, Hamid Abdullah

    Published 2018
    “…This study proposes a new automatic thresholding algorithm based on the acquisition of the defective region histogram and the selection of its extreme edge as the threshold value to segment all defective objects in the foreground from the image background. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A survey of component carrier selection algorithms for carrier aggregation in long term evolution-advanced by Mohd. Ramli, Huda Adibah, Asnawi, Ani Liza, Mohd. Isa, Farah Nadia, Azman, Amelia Wong

    Published 2017
    “…It can be concluded from the study that the CC selection algorithms for newly-arrived LTE users can benefit from the channel diversity and the load status whereas the carrier aggregation that does not allocate all of the available CCs to the newly arrived LTE-A users shown to be more efficient.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Real-time time series error-based data reduction for internet-of-things applications by Wong, Siaw Ling

    Published 2018
    “…Such offline mode is not suitable for IoT applications such as monitoring, surveillance and alert system which needs to detect events at real-time. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
    Get full text
    Get full text
    Thesis
  20. 20

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…Five independent parameters(gender, race, hometown, family income, university entry mode) have been selected to conduct this study. These parameters are chosen based on prior research studies including from social sciences domains. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item