Search Results - (( based detection method algorithm ) OR ( panel information ((a algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Optimisation of tilt angles for fixed PV Panel via computational algorithm by Tang, Hong Wei

    Published 2022
    “…Therefore, this Final Year Project (FYP) proposes and develops a computational algorithm to calculate the annual energy generation at different tilt angles of the PV panel and determine the optimum tilt angles of the PV panel at various locations in Malaysia under local weather conditions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Analysis of sepic DC/DC converter using perturb & observe algorithm for photovoltaic charge controller by Wan Muhammad Firdaus, Wan Sulaiman

    Published 2015
    “…This simulation provides an information on how the P&O algorithm reacts to the changement of solar irradiation and how long it took for this MPPT to track the Maximum Power Point (MPP). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    The prevalence of germinal centre B-cell and nongerminal centre B-cell subtypes of diffuse large B-cell lymphomas (hans algorithm) in Hospital Sultanah Bahiyah: a comparison with m... by Sobri, Siti Shakinah

    Published 2020
    “…It can be classified into two prognostic subgroups, germinal centre B-cell (GCB) and non-GCB (NGCB) subtypes using an immunohistochemistry (IHC) panel comprising of CD10, BCL6, and MUM1 according to Hans Algorithm (HA) while Muris algorithm (MA) incorporate BCL2 as a prognostic marker. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Integration Of Machine Vision In Industrial Robot For Automated Composite Panel Punching by Mohamed Hanafee, Ameer Mohamed Abdeel Aziz

    Published 2018
    “…The aim of this research is to build a machine vision algorithm for assisting KUKA robot in recognizing and calibrating various shapes of composite panels precisely. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Peripheral Interface Controller (PIC) Based Maximum Power Point Tracking (MPPT) Algorithm For Photovoltaic (PV) DC To DC Boost Converter by Siam, Effendy Onn

    Published 2016
    “…Solar panel voltage and current are continuously monitored by a closed-loop microprocessor based control system, and the duty cycle of the boost converter continuously adjusted to extract maximum power. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article