Search Results - (( parameter detection method algorithm ) OR ( frames detection path algorithm ))

Refine Results
  1. 1

    False path identification algorithm framework for nonseparable controller-data path circuits by Shaheen, Ateeq U. R., Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Intelligent auto tracking in 3D space by image processing by Al-Khateeb, Khalid A. Saeed, Awang, Mat Kamil, Khalifa, Othman Omran

    Published 2009
    “…Hence, the spherical coordinates of the target are defined and updated with every TV frame. The time development of the centroid in successive TV frames represents the real time trajectory of the target path. …”
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Obstacle detection technique using multi sensor integration for small unmanned aerial vehicle by Ramli, Muhammad Faiz, Shamsudin, Syariful Syafiq, Legowo, Ari

    Published 2017
    “…In the experiment conducted, we successfully detect and determine a safe avoidance path for the UAV on 6 different sizes and textures of the obstacles including textureless obstacles…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Safe avoidance region detection for unmanned aerial vehicle using cues from expansion of feature points by Ramli, Muhammad Faiz, Sutjipto, Agus G.E., Sulaeman, Erwin, Ari Legowo, Ari Legowo

    Published 2024
    “…A robust system should be able to not only detect obstacles but the free region for the avoidance path as well. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Real time tracking in 3D space by robotic vision by Al-Khateeb, Khalid A. Saeed, Dandu, Mohd Akram

    Published 2007
    “…The tracking is based on passive detection using live TV imaging. The target coordinates are determined by an image processing technique and non-linear prediction algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  19. 19

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa'

    Published 2025
    “…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
    Get full text
    Get full text
    Article
  20. 20

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa’

    Published 2025
    “…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
    Get full text
    Get full text
    Get full text
    Article