Search Results - (( data detection method algorithm ) OR ( data virtualization based algorithm ))

Refine Results
  1. 1

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…As for this study, virtual area based is been used which applied to bathymetry data set that has been collected by using R2 Sonic 2020. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…All the algorithms were pretrained from ImageNet data-base before training with the wafer defect images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO by MAHABADI, SEYED ALI KASAEIZADEH MAHABADI

    Published 2010
    “…Lastly, in the final stage it elaborates different methods of displaying reconstructed result. Different sets of data are processed based on the steps involved in correspondence and the results are discussed and compared in detail. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A novel discrete wavelet transform-based graphical language classifier for identification of high-impedance fault in distribution power system by Veerasamy, Veerapandiyan, Abdul Wahab, Noor Izzri, Vinayagam, Arangarajan, Othman, Mohammad Lutfi, Ramachandran, Rajeswari, Inbamani, Abinaya, Hizam, Hashim

    Published 2020
    “…The proposed method of classifier is developed using virtual instrumentation LabVIEW facility, for detection of various faults such as symmetrical, unsymmetrical, and HIF in the system. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Simulation and Design of an Intelligent Mobile Robot for Fire Fighting by Chor, Keong Seng

    Published 2003
    “…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
    Get full text
    Get full text
    Thesis
  9. 9

    3D hand posture recognition using multicam by Mohd Nazrin , Muhammad, Nurdiana, Nordin

    Published 2011
    “…The hand posture recognition will employ a simple but robust algorithm by checking the number of fingers detected around virtually created circle centered at the Center of Mass (CoM) of the hand and therefore classifies the class associated with a particular hand posture. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…Attempts have been made to resolve all of these issues by using several methods such as: full text searching, text indexing, a database schema management, database data model, and query-based techniques. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Emulation of the Space Robotics System on Earth by Ten, Seng Teik

    Published 2001
    “…Moreover this instrumental setup for emulation of space robot system can be used for various algorithms study based on robotics, control and other areas.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Intruder localization wireless sensor network radar design with virtual reference tags by Abdullah, Hadi

    Published 2014
    “…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item