Search Results - (( process information using algorithm ) OR ( variable detection method algorithm ))

Refine Results
  1. 1

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  3. 3

    Fault detection and diagnosis for gas density monitoring using multivariate statistical process control by Norul Shahida, Che Din, Noor Asma Fazli, Abdul Samad, Chin, Sim Yee

    Published 2011
    “…Results show that method based on PCA and PCorrA was able to detect the pre-designed faults successfully and identify variables which cause the faults.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour by Jan, Ketil Arnulf, Kai, Rune Larsen, Øyvind, Lund Martinsen, Bong, Chih How

    Published 2014
    “…Some disciplines in the social sciences rely heavily on collecting survey responses to detect empirical relationships among variables. We explored whether these relationships were a priori predictable from the semantic properties of the survey items, using language processing algorithms which are now available as new research methods. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
    Get full text
    Get full text
    Article
  8. 8

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Gene Selection For Cancer Classification Based On Xgboost Classifier by Teo, Voon Chuan

    Published 2022
    “…Due to this situation, development of the gene selection method has become more important in obtain useful information for cancer classification, and diagnoses for other diseases. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Rapid and non-destructive monitoring of the drying process of glutinous rice using visible-near infrared hyperspectral imaging by Jimoh, Kabiru Ayobami, Hashim, Norhashila, Shamsudin, Rosnah, Che Man, Hasfalina, Jahari, Mahirah

    Published 2025
    “…The best performance accuracy (RP2≥99.99░%)was obtained when the SG1D and Gaussian process regression (GPR) model were combined with iteratively retained informative variable algorithm (SG1D-IRIV-GPR), variable iterative space shrinkage (SG1D-VISSA-GPR) and variable combination population analysis (SG1D-VCPA-GPR) for the prediction of MC, GI, and ΔE, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
    Get full text
    Learning Object
  15. 15

    AI Adoption for Steam Boiler Trip Prevention in Thermal Power Plants by Ismail F.B., Al-Kayiem H.H., Kazem H.A.

    Published 2025
    “…These findings collectively emphasize the potential of AI-driven methods in enhancing early detection and prevention of boiler trips, thereby contributing to improved operational safety and efficiency. ?…”
    Article
  16. 16

    An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction by Ahanin, Fatemeh

    Published 2023
    “…In the third method, a hybrid algorithm called LSTM-C-EST, which is a combination of Fuzzy-MDL and LSTM-C is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models by Susanto, Tabita Yuni, Choiruddin, Achmad, Purnomo, Jerry Dwi Trijoyo

    Published 2023
    “…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data by Baba, Ishaq Abdullahi

    Published 2022
    “…The results obtained from the simulation study and real data sets indicate that the proposed method possesses high detection power with minimal misclassification error compared to the MRCD and MDP methods. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis