Search Results - (( data application based algorithm ) OR ( basic detection using algorithm ))

Refine Results
  1. 1

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Forgery detection in medical images using Complex Valued Neural Network (CVNN) by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Zeki, Akram M., Aburas, Abdurazzag Ali

    Published 2011
    “…Ability of the algorithm to localize modification undergone makes it a unique and efficient algorithm for authentication and tamper detection as well as blind detection applications.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer by Tehseen Mazhar, Inayatul Haq, Allah Ditta, Syed Agha Hassnain Mohsan, Faisal Rehman, Imran Zafar, Jualang Azlan Gansau, Lucky Poh Wah Goh

    Published 2023
    “…Moreover, this paper also defined the basic requirements for creating a skin cancer detection application, which revolves around two main issues: the full segmentation image and the tracking of the lesion on the skin using deep learning. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Ohka, Masahiro

    Published 2019
    “…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…This paper present the experimental results that demonstrate the ability of Wifi Positioning system to estimate location of the devices using K-NN algorithm and result in application part is shown based on highest percentage accuracy of time taken to intend bus stop.…”
    Get full text
    Student Project
  12. 12

    Google the earth: what's next? by Mansor, Shattri

    Published 2010
    “…Considering the exponential growth of data volumes driven by the rapid progress in sensor and computer technologies in recent years, the future of remotely sensed data should ideally be in automated data processing, development of robust and transferable algorithms and processing chains that require little or no human intervention. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  13. 13

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Hence. SE requires to use various techniques to ensure validity of the results and to detect and identify sources of errors. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Concentration and velocity measurement of flowing objects using optical and ultrasonic tomography by Saad, Mohd. Sazli

    Published 2007
    “…Prototype circuits have been implemented for optical and ultrasonic measurement system. Visual Basic 6.0 is used for software algorithms on concentration and velocity measurement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…Therefore, a relational database (RDB) is most commonly used as a backbone in most application software for organising such data into structured form. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Whereas, the hash value of RBF bases that is identical with the hash value of the training data is used to select the RBF bases that is near to the training data. …”
    Get full text
    Get full text
    Thesis