Search Results - mode ((((exraction algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1
  2. 2

    Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode. by Tan , Beng Ghee

    Published 2016
    “…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of sorting system for oil palm in vitro shoots using machine vision approach by Al-Ruhaimi, Hamdan Yahya Ahmed

    Published 2014
    “…A smart object tracking algorithm (SOTA) has been proposed for detecting and identifying the shoot on the conveyor belt. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Article
  6. 6

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Hydraulic characterization of PVC-O pipes by means of transient tests by Ghazali, M. F., Nizwan, Che Ku Eddy, Ismail, Nurazima, Sani, M. S.M., Yusof, Mohd Fadhlan M., Mohamed, Zamri

    Published 2019
    “…The series of decomposition of signals is then carefully selected on where the supposed reflected intrinsic mode function (IMF). These IMFs that where being displayed by using a mathematical algorithm, that is known as Hilbert Transform (HT) spectrum. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Passive forward scatter radar based on LTE signal for vehicle detection and classification by Abdul Aziz, Noor Hafizah

    Published 2018
    “…This thesis clarifies in details the LTE based passive forward scatter radar receiver circuit, the detection scheme and the classification algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Improved static and dynamic FBG sensor system for real-time monitoring of composite structures by Vorathin, Epin

    Published 2017
    “…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An effective source number enumeration approach based on SEMD by Ge, Shengguo, Mohd Rum, Siti Nurulain, Ibrahim, Hamidah, Marsilah, Erzam, Perumal, Thinagaran

    Published 2022
    “…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
    Get full text
    Get full text
    Article
  14. 14

    Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms by Choong, Chun Sern

    Published 2020
    “…The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  16. 16

    Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review by Ibrahim, Buhari, Suppiah, Subapriya, Ibrahim, Normala, Mohamad, Mazlyfarina, Abu Hassan, Hasyma, Syed Nasser, Nisha, Saripan, M. Iqbal

    Published 2021
    “…Resting-state fMRI (rs-fMRI) detects functional connectivity (FC) abnormalities that occur in the brains of patients with Alzheimer's disease (AD) and mild cognitive impairment (MCI). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Leak Detection in Medium Density Polyethylene (MDPE) Pipe Using Pressure Transient Method by Makeen, Mohd Amin, M. F., Ghazali, N. F., Adnan

    Published 2015
    “…The series of decomposition of signals is then carefully selected on where the supposed reflected intrinsic mode function (IMF). These IMFs that where being displayed by using a mathematical algorithm, that is known as hilbert transform (HT) spectrum. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Leak localization using empirical mode decomposition and teager-kaiser energy operator analysis based on pressure transient signal: experimental study by Pi Remli, Mohd Aminuddin, Ghazali, M. F., Azmi, W. H., Mohd Yusof, M. F., M. Yusop, Hanafi, Azmi, M. L.

    Published 2019
    “…This paper focused on leak identification and localization using Teiger-Kaiser Energy Operator (TKEO) as instantaneous frequency analysis (IFA) while Empirical Mode Decomposition (EMD) as decomposition method with implementation of Integrated Kurtosis Algorithm for Z-Filter (Ikaz) to Kurtosis ratio as the automatic selection criterion for intrinsic mode function (IMF). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item