Search Results - (( _ application during algorithm ) OR ( its detection based algorithm ))

Refine Results
  1. 1

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…The fault syndrome based on read operations of the proposed algorithm is generated to determine its diagnostic capability. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of an efficient algorithm for fetal heart rate detection: a hardware approach by Ibrahimy, Muhammad Ibn, Reaz, Mamun Bin Ibne, Mohd Ali, Mohd Alauddin, T., H. Khoon, Ismail, Ahmad Faris

    Published 2006
    “…The algorithm is based on cross-correlation, adaptive thresholding and statistical properties in the time domain. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…From the experiments towards 12 benchmark and two outbreak datasets, the improved DCA is proven to have a better detection result than its previous version in terms of sensitivity, specificity, false detection rate and accuracy.…”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing by Tan, Jun You

    Published 2022
    “…YOLOv7 is chosen as the object detection algorithm to detect sun, while Q-learning is chosen as the algorithm for reinforcement learning to control the motors. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    MelScan: An Android Application for Early Detection of Melanoma by Nyambang, Edwin

    Published 2014
    “…Due to time constraints, the scope of this study was narrowed to analyzing current image processing technology used in melanoma detection, especially on the Android mobile platform, developing an Android application that can use one of the image processing algorithms for melanoma detection, and to improve accuracy of melanoma detection, in particular during its early stages. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    An adaptive anomaly threshold in artificial dendrite cell algorithm by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2017
    “…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A new algorithm for human face detection using skin color tone by Zangana, Hewa Majeed, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…Human face recognition systems have gained a considerable attention during last decade due to its vast applications in the field of computer and advantages over previous biometric methods. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool by Obada , M. A. Asqool

    Published 2022
    “…The assessment was conducted by observing the performance of each algorithm and comparing its performance with other algorithms when lane-splitting data were applied. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Process monitoring and fault detection in nonlinear chemical process based on multi-scale Kernel Fisher discriminant analysis by Md Nor, Norazwan, Hussain, Mohd Azlan, Che Hassan, Che Rosmani

    Published 2015
    “…The wavelet coefficients obtained during the analysis are used as input for the algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Moving object detection at night by Chew, Chin Lee

    Published 2007
    “…Detection of moving object in during day light has been an active research areas and variety of well established algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…A case study was reported to provide evidence of the feasibility of the approach and its benefits in increasing the rate of fault detection and reduction in regression testing effort. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis