Search Results - (( data detection method algorithm ) OR ( program implementation _ algorithm ))

Refine Results
  1. 1

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The highest accuracy is 78.33% ofthe 10-fold Cross Validation method are found in data is 80% training and 20% testing when k is equal to 5. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The purpose of this study is to apply the K-Means algorithm to perform clustering on COVID-19 data to determine the high spread of the virus in regions in Indonesia based on the frequency of the data. …”
    Get full text
    Get full text
    Book Section
  3. 3

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…The shortest distance is defined as best result. A set of data contains position of marbles is tested for ACO algorithm in the prototype. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Cyclic redundancy encoder for error detection in communication channels by Khalifa, Othman Omran, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2004
    “…This paper describes the methodology used and the implementation of the Cyclic Redundancy Check (CRC) algorithm using Ci+ programming. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Fuzzy speed controller for DC motor drives by Muhammad Izzuddin, Jaafar

    Published 2013
    “…Clanguage programming will be used as assemble language for programming and develop the algorithm and interface.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Performance comparison of various YOLO architectures on object detection of UAV images by Gunawan, Teddy Surya, Mahmoud Ismail, Islam Mohamed, Kartiwi, Mira, Ismail, Nanang

    Published 2022
    “…Current Unmanned Aerial Vehicles (UAVs) applications in transportation systems encourage the development of object detection methods to collect real-time traffic data using UAVs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Image processing on intel edison microcontroller for pork detection by Khdhair, Zaid Hadi

    Published 2016
    “…On the other hand, Intel Edison and a traditional computer have implemented the Python algorithm, and the performance of each system has been recorded. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi, Al-Habshi, Mohammed Mustafa

    Published 2025
    “…Objectives: The main objective of the study is to classify the severity level of FLS disease in soybean using hyperspectral reflectance data and machine learning algorithms. Materials and Methods: We used hyperspectral reflectance data from healthy and FLS of soybeans. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Design and development of bi-directional two stage battery charger for dual PV-grid by Yusoff Shazilly, Muhammad Imran

    Published 2017
    “…The implementation of Arduino software and libraries in AVR microcontroller significantly reduce the complexity of programming in order to create signals which provides charging algorithm and detects current and voltage for the charging circuit. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian by Tey, Siew Kian

    Published 2009
    “…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Self routing traffic light for traffic light controller using priority method based on volume of vehicles by Tan, Swee Tiang

    Published 2015
    “…In order to increase and enhance the efficiency and accuracy of real time traffic flow, this thesis proposes a novel implementation of sensing method called Self-Routing Traffic Light (SRTL) which incorporates a self-algorithm program as a practical solution to reduce traffic congestion. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  20. 20

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis