Search Results - (( based constructive method algorithm ) OR ( features detection method algorithm ))

Refine Results
  1. 1

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  2. 2

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
    Get full text
    Get full text
    Article
  3. 3

    IMAGE STITCHING USING HARRIS CORNER & SIFT FEATURES by SHAMSUL KAMAR, FARAH AZLIN

    Published 2016
    “…In this project work, the objective is to implement and design an algorithm of image stitching construction with approaches of two types of feature based, which are Harris corner and Scale-Invariant Feature Transform (SIFT) features method. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…This paper presents detection of emphasis in Malay sentences. Thus, the purpose of this research is consisting, to construct emphasized Malay speech, to evaluate pitch and intensity features on Malay words and lastly to classify the Malay words using intonation features. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Application of target detection method based on convolutional neural network in sustainable outdoor education by Yang, Xiaoming, Samsudin, Shamsulariffin, Wang, Yuxuan, Yuan, Yubin, Tengku Kamalden, Tengku Fadilah, Yaakob, Sam Shor Nahar

    Published 2023
    “…This exploration innovatively proposes a method based on the convolutional neural network (CNN) to mine the target information in underwater camera data. …”
    Get full text
    Get full text
    Article
  13. 13

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…In addition, this study aims to improve the performance of the face recognition method under the effect of different optical zooms by detecting the normalised facial feature region using the proposed facial feature region normalisation method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…The last MATLAB test for MSS-CA- vi CFAR with a spiky exponential model shown in Table 4.3 in chapter four shows clearly that MSS-CA-CFAR detects nine targets from ten that means the efficiency of detection of the proposed method is 90%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Obstacle detection for Unmanned Aerial Vehicle (UAV) by Abdul Khaliq, Nor Aizatul Nabila, Ramli, Muhammad Faiz

    Published 2022
    “…This study aims to develop an obstacle detection system for unmanned aerial vehicles utilising the ORB feature extraction. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa by Mustafa, Zarith Marissa

    Published 2015
    “…Another objective is to construct a prototype based on Kohonen (SOM) method to classify children with potential dysgraphia symptom whether it is high, medium or low potential. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Application of slantlet transform based support vector machine for power quality detection and classification by Mohd Noh, Faridah Hanim, Miyauchi, Hajime, Yaakub, M. Faizal

    Published 2015
    “…The result shows that the proposed method can detect and localize different type of single and multiple power quality signals. …”
    Get full text
    Get full text
    Get full text
    Article