Search Results - (( points detection method algorithm ) OR ( parameter implementation using algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Mobile robot safe navigation in unknown environment by Shayestegan, Mohsen, Marhaban, Mohammad Hamiruce

    Published 2012
    “…The resulting path, connecting a start point to a target position where in this method there is no information about the environment. …”
    Get full text
    Conference or Workshop Item
  4. 4

    Implementation of YOLOv8-seg on store products to speed up the scanning process at point of sales by Hanna Arini, Parhusip, Suryasatriya, Trihandaru, Denny, Indrajaya, Jane, Labadin

    Published 2024
    “…The small number of data points and the small number of epochs have proven reliable algorithms to implement on store products instead of using QR codes in a digital manner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory by Ng, Peng Hong

    Published 2015
    “…State observers are then implemented as the fault detection method in which the discrepancies between the measured values by the sensors and the values of the model are expressed as residuals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection by Arif Mohamad, Muhammad Luqman, Abd Rahman, Mohd Amiruddin, Mohd Shah, Nurisya, Kumar Sangaiah, Arun

    Published 2026
    “…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
    Get full text
    Get full text
    Article
  8. 8

    Detection and evaluation of Caesium-137 point source using silicone photomultiplier sensor by Md. Ali, Sham Firdaus

    Published 2021
    “…Back Projection algorithm with Ram-Lak filter is also considered to be the most suitable technique to be applied for this gamma camera in reconstructing the image of a point source gamma emitting radioactive material. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Monitoring water quality in Pusu river using Internet of Things (IoT) and Machine Learning (ML) by Kabbashi, Nassereldeen Ahmed, Hasan, Tahsin Fuad, Alam, Md Zahangir, Saleh, Tanveer, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…During the first iteration, data were gathered using sensors that measured four parameters: pH, turbidity, temperature, and total dissolved solids (TDS). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article