Search Results - (( based constructive method algorithm ) OR ( rate detection method algorithm ))

Refine Results
  1. 1
  2. 2

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…Conventional methods of inspection of constructions are time-consuming, require much labor, and make people stand in hazardous conditions. …”
    Get full text
    Get full text
    Student Project
  3. 3

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  4. 4

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…The last MATLAB test for MSS-CA- vi CFAR with a spiky exponential model shown in Table 4.3 in chapter four shows clearly that MSS-CA-CFAR detects nine targets from ten that means the efficiency of detection of the proposed method is 90%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Obstacle detection for Unmanned Aerial Vehicle (UAV) by Abdul Khaliq, Nor Aizatul Nabila, Ramli, Muhammad Faiz

    Published 2022
    “…In real-time experiment, the success rate for good texture (40%), poor texture (55%) and texture-less (45%) The findings indicate that the recommended method works well for detecting textures-less obstacle even though the success rate is only 40% because out of 10 test only one test is fail on detecting free region. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  9. 9

    Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa by Mustafa, Zarith Marissa

    Published 2015
    “…Another objective is to construct a prototype based on Kohonen (SOM) method to classify children with potential dysgraphia symptom whether it is high, medium or low potential. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Safe avoidance path detection using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2018
    “…The textured situation gives a high success rate while textureless situation produces acceptable success rate until 60cm distance.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Performance evaluation on quantized weight for convolutional neural network based object detection by Putra, Mohd Hasbullah

    Published 2021
    “…In this research, a real-time CNN based object detection system is presented. The system is designed based on the modified You Only Look Once (modified-YOLO) architecture which is constructed with only 7 CNN layers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil

    Published 2013
    “…The adopted reduced rank technique is based on Singular Value Decomposition (SVD). The proposed method has declared the superiority over the conventional methods that are being used in the current applications of TD-SCDMA systems. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Delamination in fiberglass pre-impregnated laminated composites from ultrasonic a-scan signal using artificial intelligence by Mahmod, Muhammad Faisal

    Published 2018
    “…Besides affected the material strength and structural reliability, this failure mode normally present minor damage on the surface but the internal damage may extensive. Existing detection method using static and dynamic load response have limitations that are considered static based monitoring and require the sensor to be attached to the test specimen surface. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis