Search Results - (( rate evaluation system algorithm ) OR ( frames extraction path algorithm ))

Refine Results
  1. 1

    Local DTW coefficients and pitch feature for back-propagation NN digits recognition by Sudirman, R., Salleh, Shahruddin Hussain, Salleh, Sh-Hussain

    Published 2006
    “…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
    Get full text
    Conference or Workshop Item
  2. 2

    Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
    Get full text
    Get full text
    Article
  4. 4

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…The proposed algorithm can effectively overcome load balancing problems and increase execution success rates in distributed systems that are prone to faults.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2015
    “…However, the rate remains unchanged during the algorithm iterations, which makes the algorithm either bias toward exploitation or exploration.Hence, this study proposes a strategic oscillation rate to control the exploitation and exploration in ant colony system.The proposed algorithm was evaluated with job scheduling problem benchmarks on grid computing.Experimental results show that the proposed algorithm outperforms other metaheuristics algorithms in terms of makespan and flowtime. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility by Roshahliza, M. Ramli, Salina, Abdul Samad, Noor, Ali O. Abid

    Published 2018
    “…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The simulation results showed that the Decision Tree Algorithm achieved the highest precision rate by 95.5% within 42 seconds. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…In order to measure the evaluation, several performance metrics, such as frequency of convergence of the detection scheme, accuracy of detection, false alarm rate, defence rate and energy consumption, are addressed as part of detection and prevention scheme. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Slam-based mapping for object recognition by Loh, Wan Ying

    Published 2018
    “…The SIFT (Scale-Invariant Feature Transform) is used to extract features from the current frame and match with the object database to identify and recognize the object whenever the robot come across the object. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Both enhancements were evaluated in terms of accuracy, false positive alarm and detection rate against state-of-the-practice dataset (KDD Cup 99 dataset) in IDS application. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Object tracing from synthetic fluid spray through instance segmentation by Md Refat Khan, Pathan

    Published 2024
    “…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique by Hameed, Asaad Shakir

    Published 2021
    “…The valuate of performance HDDETS algorithm comparison to existing hybrid-based algorithms, namely: Biogeography-Based Optimization Tabu Search (BBOTS), Whale Algorithm with Tabu Search (WAITS), Hybrid Ant System (HAS), Lexisearch and Genetic Algorithms (LSGA), and Golden Ball Simulated Annealing (GBSA) algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Parallelization of speech compression based algorithm based on human auditory system on multicore system by Gunawan, Teddy Surya, Kartiwi, Mira, Khalifa, Othman Omran

    Published 2012
    “…Human auditory system has been successfully employed in speech compression to reduce bit rate requirement. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Application of multithreading technique for multiple input and multiple output mechatronic system by Saaidon, Nur'Ain, Sediono, Wahju

    Published 2017
    “…In this paper, multithreading technique is being applied in the system algorithm and evaluated for real-time color marker based navigation system for image guide surgery. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…The evaluation found that FA2 algorithm when combined with MC algorithm produce the best network representation for SAGA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Travel place recommendation system using K-Nearest Neighbors algorithm / Nur Amirah Shahidan by Shahidan, Nur Amirah

    Published 2021
    “…The algorithm used in the recommendation system has been evaluated by using MAE, MSE and RMSE to calculate the accuracy of the algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis