Search Results - (( event detection system algorithm ) OR ( panel notification system algorithm ))

Refine Results
  1. 1
  2. 2

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    High Impedance Fault Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2012
    “…The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Test Data Generation for Event Driven System Using Bees Algorithm by Mohammed Zabil, Mohd H., Kamal Z., Zamli

    Published 2013
    “…For an event driven system, the order of the event sequence should also be tested to detect failure in any possible sequences of the event. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Broken Conductor Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2013
    “…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model by Sulaiman , Marizan, Adnan, Tawafan, Ibrahim, Zulkifilie

    Published 2013
    “…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems by Mahmoud M.A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Mustapha A., Hamid N.H.A.

    Published 2023
    “…In this paper, we present our proposed algorithm to detect the obligation and prohibition norms which we called the Obligation and Prohibition Norms Mining algorithm (OPNM). …”
    Conference paper
  8. 8

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Leveraging Web Scraping in Predictive Modelling of Supply Risk Detection by Ng, Shi Ya

    Published 2022
    “…By collecting data from news sites, this system is aimed to provide data for predictive modelling so it can be used to detect patterns in supply risks to create and predict the probability of a temporary event occurring in the future…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Walking gait event detection based on electromyography signals using artificial neural network by Nazmi, Nurhazimah, Abdul Rahman, Mohd Azizi, Yamamoto, Shin Ichiroh, Ahmad, Siti Anom

    Published 2019
    “…In many gait applications, the focal events are the stance and swing phases. Although detecting gait events using electromyography signals will help the development of assistive devices such as exoskeleton, orthoses, and prostheses, stance and swing phases have yet to be observed using electromyography signals. …”
    Get full text
    Get full text
    Article
  11. 11

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by R.Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Network monitoring system consists of large data streams, distributed architecture, and multiple computers that are geographically located all over the world caused a difficulty to detect abnormalities in the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…Network monitoring system consists of large data streams, distributed architecture, and multiple computers that are geographically located all over the world caused a difficulty to detect abnormalities in the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Evaluation of fall detection classification approaches by Kerdegari, Hamideh, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Ghotoorlar, Saeid Mokaram

    Published 2012
    “…In this paper a waist worn fall detection system has been proposed. A tri-axial accelerometer (ADXL345) was used to capture the movement signals of human body and detect events such as walking and falling to a reasonable degree of accuracy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16
  17. 17

    Advance video analysis system and its applications by Ali, Md. Hazrat, Shafie, Amir Akramin, Hafiz, Fadhlan, Mat Ali, Roslizar

    Published 2010
    “…The system will trigger alarm once the motion is detected and when it exceeds the desire threshold value it will give warning to prevent any loss or mass destruction. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    IoT alarm system: detecting & preventing microsleep events by Azhar, Ahmad Mirza, Awang, Norkhushaini

    Published 2024
    “…The sensor data is transmitted to an onboard alarm unit that employs machine learning algorithms to analyze the metrics and detect early signs of microsleep episodes. …”
    Get full text
    Get full text
    Book Section
  19. 19

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Heuristic real-time detection of temporal gait events for lower limb amputees by Maqbool, Hafiz Farhan, Husman, Muhammad Afif, Awad, Mohammed Ibrahim, Abouhossein, Alireza, Iqbal, Nadeem, Tahir, Mehak, Dehghani-Sanij, Abbas Ali

    Published 2019
    “…This paper presents a complete system and algorithm to estimate temporal gait events during stance and inner-stance phases using a single inertial measurement unit (IMU) in real-time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article