Search Results - (( model detection system algorithm ) OR ( based instruction based algorithm ))*

Refine Results
  1. 1

    Fault Detection and Identification in Quadrotor System (Quadrotor Robot) by Chan, Shi Jing, Pebrianti, Dwi

    Published 2016
    “…A Quadrotor robot is used to represent a complex system in this study. The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload by Kakavand, Mohsen, Mustapha, Norwati, Mustapha, Aida, Abdullah @ Selimun, Mohd Taufik

    Published 2016
    “…This trait causes slow instruction, assessment procedures, high resource consumption and poor detection rate. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of IoT-based automated dynamic emergency response system against fire incidents in academic building by Al-Hady, Syed Mohammed Zakaria, Islam, Md Rafiqul, Rashid, Muhammad Mahbubur

    Published 2023
    “…Additionally, the proposed system incorporates Building Information Modelling (BIM) to optimize evacuation and rescue routes, providing early detection and accurate alarm capabilities, evacuation guidance for endangered individuals, and guidance for firefighters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Heartbeat disease diagnosis using text-based approaches by Khorasani, Ehsan Safar

    Published 2011
    “…In this study, we propose a feasible technique for developing a heartbeat sound retrieval system using text encoding techniques which is useful towards automated heart disease detection. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Examination timetabling for undergraduate programme using graph coloring approach / Norarida Abd Rhani ... [et al.] by Abd Rhani, Norarida, Mat Saad, Nor Najihah, Zulkfeli, Nabilah, Mazlan, Mardhiyah Marisha, Mahmud, Maziah, Mohamad, Siti Nurul Fitriah, Wan Yusoff, Wan Roslini

    Published 2021
    “…Any clashes of timetabling that arise can be detected and remedied immediately. An algorithm based on Graph coloring technique is one of the feasible solutions that can address these issues of managing timetables. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  10. 10

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12
  13. 13

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…HAS is to schedule the instructions based on the priority of instructions from the aspect of space and time. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Propose a new firefly-fast learning network model based intrusion-detection system by Badran, Mohammed Falih, Moorthy, Kohbalan, Zukifi, Nor Saradatul Akmar, Mohamad, Mohd Saberi, Deris, Safaai, Md.Sahar, Nan

    Published 2019
    “…However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a single algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Development of vehicle detection and counting system for traffic analysis using computer vision by Saw, Kenny Wei Wen

    Published 2024
    “…Once the trained weights are ready a deep learning algorithm detection model is applied to detect and draw a bounding box on the vehicles. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Analytical redundancy based fault detection system generally requires an accurate model. …”
    Get full text
    Conference or Workshop Item
  19. 19

    An FPGA based embedded vision system for real-time motion detection by AlDahoul, Nouar, Htike@Muhammad Yusof, Zaw Zaw

    Published 2015
    “…This results in a Gaussian Pyramid down sampling multi model sigma delta algorithm that gives low false detection error and good performance. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
    Get full text
    Get full text
    Thesis