Search Results - (( site detection method algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    Pipeline condition assessment by instantaneous frequency response over hydroinformatics based technique—An experimental and field analysis by Muhammad Hanafi, Yusop, Ghazali, M. F., Mohd Fadhlan, Mohd Yusof, Muhammad Aminuddin, Pi Remli

    Published 2021
    “…The results showed that, although with a low ratio of signal-to-noise, the proposed method could be used as an automatic selector for Intrinsic Mode Function (IMF). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Leak localization using empirical mode decomposition and teager-kaiser energy operator analysis based on pressure transient signal: experimental study by Pi Remli, Mohd Aminuddin, Ghazali, M. F., Azmi, W. H., Mohd Yusof, M. F., M. Yusop, Hanafi, Azmi, M. L.

    Published 2019
    “…This paper focused on leak identification and localization using Teiger-Kaiser Energy Operator (TKEO) as instantaneous frequency analysis (IFA) while Empirical Mode Decomposition (EMD) as decomposition method with implementation of Integrated Kurtosis Algorithm for Z-Filter (Ikaz) to Kurtosis ratio as the automatic selection criterion for intrinsic mode function (IMF). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
    Get full text
    Get full text
    Research Reports
  5. 5

    Wind direction and speed estimation for quadrotor based gas tracking robot by Eu, Kok Seng *, Chia, Wei Zheng, Yap, Kian Meng *

    Published 2017
    “…In gas extraction sites, the incidents of gas leaking poses a damage to workers on site. …”
    Get full text
    Book Section
  6. 6

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection by Muhammad Arif, Mohamad, Muhammad Aliif, Ahmad, Zuriani, Mustaffa

    Published 2024
    “…Artificial Neural Network (ANN) is one popular method for website phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics connected to phishing websites through a network training phase. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  10. 10

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Twisted pair cable fault diagnosis via random forest machine learning by Ghazali, N. B., Seman, F. C., Isa, K., Ramli, K. N., Z. Abidin, Z., Mustam, S. M., Haek, Haek, Z. Abidin, A. N., Asrokin, A.

    Published 2022
    “…This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Determining the preprocessing clustering algorithm in radial basis function neural network by S.L. Ang, H.C. Ong, H.C. Law

    Published 2008
    “…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism by Yan, Zuo, Chai, Soo See, Goh, Kok Luong

    Published 2024
    “…To improve the speed of video detection, a student's abnormal-behavior detection method was proposed based on improved YOLOv8 and attention mechanism to achieve real-time detection of cheating actions in an exam room on a regular performance computer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery by Aisyah Marliza Muhmad Kamarulzaman, Wan Shafrina Wan Mohd Jaafar, Siti Nor Maizah Saad, Hamdan Omar, Mohd. Rizaludin Mahmud

    Published 2021
    “…Feature extraction and segmentation images to extract stumps from a UAV scene of a forested area in Ulu Jelai, Pahang provides a quick, automated method for identifying stumps. This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller by Ismail, H. Muh Yusuf

    Published 2010
    “…Thus it is important to select the accurate membership functions but these methods possess one common weakness where conventional FLC use membership function and control rules generated by human operator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    The efficiency of conjugate gradient methods with global convergence / Siti Nur Hafiza Shamsudin by Shamsudin, Siti Nur Hafiza

    Published 2019
    “…The global convergence result is established using exact line searches. Numerical result shows that algorithm 2 which is one of the proposed CG methods is more efficiency when compared to other algorithms.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm by Dalatu, Paul Inuwa

    Published 2018
    “…It shows that the IQR-HEOM method is more efficient to rectify the problem caused by using range in HEOM. …”
    Get full text
    Get full text
    Get full text
    Thesis