Search Results - object ((((function algorithm) OR (connection algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…Connected components algorithm was implemented for insect detection and counting. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…Hence, this project was proposed to help in overcome the problems. The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    WSN sensor node placement approach based on multi-objective optimization by Abidin H.Z., Din N.M., Radzi N.A.M.

    Published 2023
    “…The performance of the WSN deployed with MOTPSMA is then compared with another algorithm known as Multi-objective Evolutionary Algorithm based on Fuzzy Dominance (MOEA/DFD) in terms of coverage ratio, connectivity and energy consumption. …”
    Conference Paper
  4. 4

    Sensor Node Placement in Wireless Sensor Network Using Multi-objective Territorial Predator Scent Marking Algorithm by Zainol Abidin H., Din N.M., Yassin I.M., Omar H.A., Radzi N.A.M., Sadon S.K.

    Published 2023
    “…The algorithm uses the maximum coverage and minimum energy consumption objective functions with subject to full connectivity. …”
    Article
  5. 5

    Multi-objective biological mimicry optimization algorithm for WSN sensor node placement by Abidin H.Z., Din N.M., Radzi N.A.M.

    Published 2023
    “…Algorithms; Bioinformatics; Energy utilization; Integer programming; Multiobjective optimization; Optimization; Wireless sensor networks; biological inspired; connectivity; coverage; energy; Multi objective; Sensor node placement; WSN; Sensor nodes…”
    Conference Paper
  6. 6

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…A new algorithm is proposed to detect a corner of a thinned binary image that is represented by an eight-connected contour chain code. …”
    Get full text
    Get full text
    Article
  7. 7

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
    Get full text
    Get full text
    Thesis
  9. 9

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Real-time face mask detection using YOLOv4 by Tey, Chen Hup

    Published 2022
    “…This application will apply an object tracking algorithm when performing face mask detection in real-time to prevent the detections on the same object from being stored into the database repeatedly in every single frame. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Modelling of cupping suction system based on system identification method by Suresh, Kavindran, Ghazali, M. R., Ahmad, M. A.

    Published 2022
    “…The detection of cupped suction system plants using a standard model based on a modified Sine Cosine Algorithm (mSCA) is presented in this research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    WSN sensor node placement approach using Territorial Predator Scent Marking Algorithm (TPSMA) by Abidin H.Z., Din N.M.

    Published 2023
    “…The TPSMA deployed in this paper uses the minimum uncovered area as the objective function. The performance of the proposed technique is then compared with other two sensor node placement schemes that are based on Integer Linear Programming (ILP) in terms of coverage ratio, connectivity and energy consumption. …”
    Conference paper
  16. 16
  17. 17

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems by Mushtaq, Najeeb, Ramdan, Razali, K. G., Mohammed, Hamdan, Daniyal, Ali, M. Humada

    Published 2016
    “…Integral Square Error (ISE) is considered as an objective function for both algorithms to determine its performance index value for the same parallel-connected power system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…These templates are combined to create the most ideal algorithm to detect a moving object in an image. A video of a bouncing ball is recorded using a static camera. …”
    Get full text
    Get full text
    Undergraduates Project Papers