Search Results - (( shape identification using algorithm ) OR ( variable detection using algorithm ))

Refine Results
  1. 1

    Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection by Mazaheri, Amin

    Published 2018
    “…Voltammetry as electrochemical technique is used in this project for the heavy metals detection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Human identification at a distance using body shape information by Alang Md Rashid, Nahrul Khair, Yahya, M. F., Shafie, Amir Akramin

    Published 2013
    “…This paper presents an intelligent system approach for human identification at a distance using human body shape information. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…This study focuses on two visual features associated with personality traits, which are colors and shapes. To achieve the aim of this study, Design Science methodology was used through three main phases: problem identification, design of solution, and evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes by Abd Halim, Zakiah, Jamaludin, Nordin, Putra, Azma

    Published 2019
    “…The AR algorithm characterizes the shape of the stress wave signals by AR coefficients and clustered using ‘centroid’ linkages. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. Furthermore, a linear model has been built to facilitate the accomplishment of the fault detection of the industrial servo system by using the proposed observer. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A real time road marking detection system on large variability road images database by Khan, Bahadur Shah, Hanafi, Marsyita, Mashohor, Syamsiah

    Published 2017
    “…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Identification of material properties of composite plates using Fourier-generated frequency response functions by Tam, Jun Hui, Ong, Zhi Chao, Lau, Chun Lek, Ismail, Zubaidah, Ang, Bee Chin, Khoo, Shin Yee

    Published 2019
    “…The present research adopts the use of Fourier-based plate model to synthesize FRFs for its proven prominent accuracy and incorporates with a hybrid optimization algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  19. 19

    Simulation Models for Straight Lines Images Detection Using Hough Transform by Qussay, Abbas Salih Al-Badri

    Published 2001
    “…The HT is a technique which is used to isolate curves of a given shape in an image. …”
    Get full text
    Get full text
    Thesis
  20. 20