Search Results - (((electron OR electronics) algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Malaysian license plate number detection based on sobel vertical edge algorithm / Siti Nor Azimah Ibrahim by Ibrahim, Siti Nor Azimah

    Published 2007
    “…The system captures the images of the vehicles with a digital camera. An algorithm for the detection of license plate has been designed and an algorithm for filter the detected edge is proposed for future process which is plate number extraction This project describes the method used by a computer to convert digital images of vehicles license plate into electronic text. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…An algorithm for the design object detection systems is presented. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  5. 5

    Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems by Hnaif, Adnan Ahmad Abdelfattah

    Published 2010
    “…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
    Get full text
    Get full text
    Thesis
  6. 6

    March-based SRAM diagnostic algorithm for distinguishing stuck-at and transition faults by Mihai, Masnita, Wan Hassan, Wan Zuha, Sidek, Roslina, Abdul Halin, Izhal

    Published 2009
    “…This paper analyses March algorithms for detection and diagnosis of Stuck-At Faults (SAFs) and Transition Faults (TFs). …”
    Get full text
    Get full text
    Article
  7. 7

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…This algorithm is based on two detection schemes; namely active and passive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by R.Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Therefore, this paper aims to develop an effective and efficient network anomaly detection system by using distributed online averaged one dependence estimator (DOAODE) classification algorithm for multi-class network data to overcome these issues. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Signal detection algorithm for cognitive radio using singular value decomposition by Omar, Mohd Hasbullah, Hassan, Suhaidi, Amphawan, Angela, Awang Nor, Shahrudin

    Published 2011
    “…This paper highlights an algorithm for detecting the presence of wireless signal using the Singular Value Decomposition (SVD) technique.We simulated the algorithm to detect common digital signals in wireless communication to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in detecting a signal without knowing the properties of the transmitted signal.The performance of the algorithm is better compared to the favorable energy detection.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown.This is also the advantage of the algorithm since any signal would interfere and subsequently affect the quality of service (QoS) of the IEEE 802.22 connection.Furthermore, the algorithm performed better in the low signalto-noise ratio (SNR) environment.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Solving time gap problems through the optimization of detecting stepping stone algorithm by Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2004
    “…It is found that current algorithm of detecting stepping stone is not optimized. …”
    Get full text
    Get full text
    Book Section
  11. 11

    High impedance fault detection and identification based on pattern recognition of phase displacement computation by Ali, Mohd Syukri, Bakar, Ab Halim Abu, Tan, Chia Kwang, Arof, Hamzah, Mokhlis, Hazlie

    Published 2018
    “…This paper proposes a new algorithm for high-impedance-fault (HIF) detection based on phase displacement computation (PDC). …”
    Get full text
    Get full text
    Article
  12. 12

    Development of pose estimation algorithm for Quranic Arabic word by Mohd Esa, Luqman Naim, Morshidi, Malik Arman, Mohd Zailani, Syarah Munirah

    Published 2018
    “…The study carried out in this report proposes the best keypoint detection, description, and pose estimation algorithm combination for Quranic Arabic words. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Joint optimal detection of ordering SIC ZF and SIC ZF MAP for V-BLAST/STBC wireless communication systems by Chong, Jin Hui, Khatun, Sabira, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin, Syed Junid, Syed Mansor

    Published 2008
    “…Simulation results show the symbol error rate performance degradation of the proposed algorithm is small compared to SIC ZF MAP detection.…”
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Printed circuit board inspection using wavelet-based technique by Ibrahim, Zuwairie

    Published 2002
    “…The defect is detected by utilizing wavelet-based image difference algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin by Suhaimi, Hamizan, Suliman, Saiful Izwan, Musirin, Ismail

    Published 2021
    “…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
    Get full text
    Get full text
    Get full text
    Article