Search Results - (( parallel detection sensor algorithm ) OR ( variable detection packet algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Development of an automatics parallel parking system for nonholonomic mobile robot by Mohd Fairuz , Abdollah, Syed Najib , Syed Salim, Irma Wani , Jamaludin, Muhammad Nizam , Kamarudin

    Published 2011
    “…The path planning algorithm is developed based on the data acquired from the sensor. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Real-time Rotation Invariant Hand Tracking Using 3D Data by Rosdiyana, Samad, M. Zabri, Abu Bakar, Pebrianti, Dwi, Nicolaas Lim, Yong Aan

    Published 2014
    “…The propose hand tracking algorithm is rotation invariant, since it can detects and tracks various rotations of hand and it is also can remove unwanted object (noise) that also moving parallel with hand's position.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Square patch feature based face detection architecture for high resolution smart camera by Mohd Mustafah, Yasir, Bigdeli, Abbas, Azman, Amelia Wong, Lovell, Brian

    Published 2010
    “…The face detection algorithm is based on a new weak classifier type that we called square patch feature. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…The performance of the proposed framework has been analyzed mathematically and through simulations which show the robustness of VFHO in terms of signaling cost, endto- end packet delivery cost, overall handoff latency, and packet loss based on various system variables. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…Like most sensors stereo camera readings are susceptible to noise due to lighting conditions and detection errors. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Estimation of core size distribution of magnetic nanoparticles using high-Tc SQUID magnetometer and particle swarm optimizer-based inversion technique by Mohd Mawardi, Saari, Mohd Herwan, Sulaiman, Kiwa, Toshihiko

    Published 2023
    “…The magnetization signal is modulated by the lateral vibration of the sample on top of a planar differential detection coil of the flux transformer. A pair of primary and excitation coils are utilized to apply an excitation field parallel to the sensitive axis of the detection coil. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Camera orientation determination based on copper wire spool shape by Farah Adiba, Azman, Mohd Razali, Daud, Amir Izzani, Mohamed, Addie Irawan, Hashim, Raja Mohd Taufika, Raja Ismail, Mohd Mawardi, Saari

    Published 2020
    “…In this study, a vision system is developed to solve the peg-in-hole problem of a robot-like forklift to pick up copper wire spool arranged side by side on a rack, without using any sensors, except a low-cost camera. Inspired by how human perceive an object orientation based on its shape, an algorithm is developed to determine robot orientation based on the shape of a copper wire spool relative to camera position and yaw angle. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item