Search Results - ((((restoration algorithm) OR (generation algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying by Khaw , Hui Ying

    Published 2019
    “…The proposed High-density Impulse Noise Detection and Removal (HINDR) model mainly consists of two parts: the impulse noise removal and impulse noisy pixel detection for restoration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor Actor Networks by Imran, Muhammad, Younis, Mohamed, Md Said, Abas, Hasbullah, Halabi

    Published 2010
    “…We present PCR, a hybrid novel distributed partitioning detection and connectivity restoration algorithm. It proactively identifies critical actors based on local topological information and designates appropriate backup nodes to handle their failure. …”
    Get full text
    Get full text
    Article
  3. 3

    Study of fuzzy based control algorithm for dynamic voltage restorer by Taghizadeh S., Tan N.M.L., Karimi-Ghartemani M.

    Published 2023
    “…Algorithms; Control systems; Damage detection; Power quality; Voltage regulators; Voltage stabilizing circuits; Battery lifetime; DVR; Dynamic voltage restorer (DVR); Electrical components; EPLL; Improved control algorithms; Phase lock loop (PLL); Sensitive loads; Fuzzy logic…”
    Article
  4. 4
  5. 5

    Partitioning detection and connectivity restoration algorithm for WSAN by Muhammad, Imran, Md Said, Abas, Hasbullah, Halabi, Younis, Mohammed

    Published 2010
    “…This paper presents PCR, a novel distributed partitioning detection and connectivity restoration algorithm. PCR proactively identifies critical actors based on local topological information and designate appropriate backup nodes (preferably non-critical) to handle their failure. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Mitigation of voltage sags/swells using dynamic voltage restorer based on DQO algorithm / Mohamad Shahrun Azizan by Azizan, Mohamad Shahrun

    Published 2009
    “…Voltage swells is a sudden increasing of supply voltage in rms voltage at network fundamental frequency cause by energizing large capacitor or switching off a large inductive load. A dynamic voltage restore based on the dqo algorithm is discussed. The control scheme is very effective to detect any disturbance in low voltage distribution systems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Restoration of missing data in old archives based on genetic algorithm by Khammar, Mohammad Reza, Saripan, M. Iqbal, Marhaban, Mohammad Hamiruce, Ishak, Asnor Juraiza, Zolfaghari, Fateme

    Published 2014
    “…After applying most algorithms to detect the position of blotches and also scratch which is another type of defect in the old media, in each frame of video, it is essential to correct them, in other words, we should fill the missing data with reasonable values. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss by Idriss Moussa , Idriss

    Published 2021
    “…The proposed method takes the blurred image with its detected edge, enhances it using Canny edged etectorasan input, and producesa corresponding detected restored sharp edge with its image, evaluated by the GANs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…Active detection algorithm generates disturbances at the output by Positive feedback and Continuous feedback signal injection which is based on DQ implementation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques by Khammar, Mohammad Reza

    Published 2015
    “…This post processing algorithm was provided based on a multi-level scanning and shape analysis which was presented for the better performance of high correct detection and lower false alarms for each given threshold. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…After applying the denoising algorithm on the contaminated image, the cycling spinning algorithm is applied to increase the visual quality of the restored image. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A comprehensive power restoration approach using rule-based method for 11kV distribution network by Khalid, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Shakil, Asma, Nik Pa, Nawar, Mohd Shafie, Roslin

    Published 2008
    “…This requires fast computation time and selection of best restoration plan for customer’s satisfaction. This paper presents a restoration algorithm based on a Rule-Based approach. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Distribution network fault section estimation using analytical database approach by Mokhtar, Ahmad Safawi

    Published 2004
    “…Therefore. in order to improve the customer minute loss, the fault section should be estimated so that the faulty section can be isolated and the rest of the sections in the feeder can be quickly restored. This thesis describes the development or a new fault section estimation algorithm in a distribution network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2018
    “…The algorithm employs two amplitude independent and computations efficient methods to detect weak and noisy muscle activities from surface electromyography (sEMG) signal obtained by a single channel located on the forearm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Inverse problem in image processing: Image restoration by Wong, Yen Khai

    Published 2023
    “…The results show that the proposed MB-ES algorithm achieves remarkable performance in detecting the stopping point that closely resembles the ground truth. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Generation of new low-complexity March algorithms for optimum faults detection in SRAM by Jidin, Aiman Zakwan, Hussin, Razaidi, Lee, Weng Fook, Mispan, Mohd Syafiq, Zakaria, Nor Azura, Loh, Wan Ying, Zamin, Norshuhani

    Published 2023
    “…A high-complexity test algorithm like the March MSS (18N) can guarantee the detection of all unlinked static faults in SRAM. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
    Get full text
    Get full text
    Thesis