Search Results - (( form detection method algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Model verification of all method and model proposed in this study are examined using the simulation study. …”
    Get full text
    Get full text
    Thesis
  7. 7

    MRI brain tumor detection methods using contourlet transform based on time adaptive self-organizing map by Ali Farzamnia, Seyed Hamidreza Hazaveh, Seyede Safieh Siadat, Ervin Gubin Moung

    Published 2023
    “…In this article, we propose a novel method that uses contourlet transform and time adaptive self-organizing map, optimized by the whale optimization algorithm, in order to distinguish between benign and malignant brain tumors in MRI images. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering by Davari, Atefeh, Marhaban, Mohammad Hamiruce, Mohd Noor, Samsul Bahari, Karimadini, Mohammad, Karimoddini, Ali

    Published 2011
    “…This is achieved by a pre-estimation using fuzzy clustering that provides a prior knowledge and forms a rough model to be fine tuned using the least square method. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Face emotion recognition using artificial intelligence techniques by Kartigayan Muthukaruppan

    Published 2008
    “…The acquired images have gone through few preprocessing methods. The edge detection has to be successful even when the intensity of light is uneven. …”
    Get full text
    Thesis
  11. 11

    Outlier Detections and Robust Estimation Methods for Nonlinear Regression Model Having Autocorrelated and Heteroscedastic Errors by Riazoshams, Hossein

    Published 2010
    “…Finally, we proposed statistics practitioners to use the formal modeling algorithms to get better inferences. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review by Ibrahim, Buhari, Suppiah, Subapriya, Ibrahim, Normala, Mohamad, Mazlyfarina, Abu Hassan, Hasyma, Syed Nasser, Nisha, Saripan, M. Iqbal

    Published 2021
    “…We conducted a systematic review aimed at determining the diagnostic power of rs-fMRI to identify FC abnormalities in the DMN of patients with AD or MCI compared with healthy controls (HCs) using machine learning (ML) methods. Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah by Mansoor Abdullah, Hayat

    Published 2012
    “…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
    Get full text
    Learning Object
  15. 15
  16. 16

    Personal identification by Keystroke Pattern for login security by Abdullah, Norhayati

    Published 2001
    “…Several other factors such as momentum, learning rate and various weight initialization were used for comparison. Three types of weight initialization were used, including Nguyen-Widrow (NW), Random and Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models by Susanto, Tabita Yuni, Choiruddin, Achmad, Purnomo, Jerry Dwi Trijoyo

    Published 2023
    “…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
    Get full text
    Get full text
    Get full text
    Article