Search Results - (( cover selection methods algorithm ) OR ( based information systems algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim by Ibrahim, Erman

    Published 2007
    “…A study on the research and development of the previous project based on pattern recognition has been done as a result selected; method, theory and techniques will be gathered in order to perform a hand gesture for sign language recognition system. …”
    Get full text
    Thesis
  3. 3

    Image steganography for encryption over network security by Maimon, Elmy Fadly

    Published 2017
    “…The performance of the image steganography method has been evaluated based on the quality of cover image with stego image, robustness and capacity of data hidden in the stego image. …”
    Get full text
    Get full text
    Student Project
  4. 4

    A predictive approach to improve a fault tolerance confidence level on grid resources scheduling by Bouyer, Asgarali, Md. Sap, Mohd. Noor

    Published 2008
    “…On the other hand, since many methods use from GIS information to learn about resources, so they cannot powerfully select optimal nodes because the GIS don't cover all information about grid resources. …”
    Get full text
    Get full text
    Article
  5. 5

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…In the other hand a new concealment method proposed by combine two of the popular methods DWT and DCT for embedding and extraction the secret data in order to compensate the drawbacks of both of them and to make the hidden information much more secure against the attacks, wavelet transform which use dyadic filters to decompose cover image into 4-levels (HH, HL, LH and LL) and discrete cosine Transforms to convert a signal of the selected coefficients (HH, HL and LH) into elementary frequency components then according to the percentages entering by a user the encrypted data will distribute. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Imaging of solid flow in a gravity flow rig using infra-red tomography by Md. Yunus, Mohd. Amri

    Published 2005
    “…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Termite mounds morphometry in predicting groundwater potentiality using geospatial technology by Bala, Ahmed Jamilu

    Published 2020
    “…Thereafter, twelve (12) groundwater conditioning factors (GCFs) (geology, drainage density, lineament density, lineament intersection density, land use/land cover, topographic wetness index (TWI), normalized difference vegetation index (NDVI), slope, elevation, plan curvature, static water level and groundwater level fluctuation) were passed through a feature selection filter (Correlation-based feature selection using the best first algorithm) to select the optimum groundwater control factors (GCFs) for groundwater prediction in the study area. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm by Noor Azam, Muhammad Harith, Ridzuan, Farida, Mohd Sayuti, M Norazizi Sham

    Published 2023
    “…In conclusion, the method optimised the cover audio selected, thus, improving the effectiveness of the audio steganography used. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The finalized configuration that resulted in the best response was adopted and used to collect data for training and classifying the gait phase using pattern recognition method. The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Thermal Imaging Analysis of Potentially Harmful Subject for Night Vision System by Noor Amira Syuhada, Mahamad Salleh, Kamarul Hawari, Ghazali

    Published 2013
    “…Hence, this present paper proposed few techniques on image processing to enhance the surveillance efficiency based on the thermal image dataset. The selection of the correct technique is followed the specification, process and output from this thermal surveillance system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran by Narany, Tahoora Sheikhy

    Published 2015
    “…Groundwater quality assessment based on the data obtained from arbitrary sampling wells might be presented redundant or shortage of information. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Model structure selection for a discrete-time non-linear system using genetic algorithm by Ahmad, Robiah, Jamaluddin , Hishamuddin, Hussain, Mohd. Azlan

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Article
  19. 19

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Article
  20. 20

    Regression test case selection & prioritization using dependence graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…It was shown that our approach needs 30% of the test cases to cover all the faults, while 80% is needed to cover all the faults using retest-all, which is time consuming and costly.…”
    Get full text
    Get full text
    Article