Search Results - (( using detection method algorithm ) OR ( parameter implementation using algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication industry using Gaussian mixed model by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Fuzzy modelling using butterfly optimization algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Nurul Aswa, Omar

    Published 2020
    “…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A pothole boundary detection algorithm using image segmentation technique in urban road by Mohd Shah, Hairol Nizam, Alshami, Abdallah M. M., Abdollah, Mohd Fairus, Ab Rashid, Mohd Zamzuri, Arshad, Mohd Ali

    Published 2025
    “…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa'

    Published 2025
    “…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
    Get full text
    Get full text
    Article
  5. 5

    Novel chewing cycle approach for peak detection algorithm of chew count estimation by Selamat, Nur Asmiza, Md Ali, Sawal Hamid, Ismail, Ahmad Ghadafi, Ahmad, Siti Anom, Minhad, Khairun Nisa’

    Published 2025
    “…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…The image data is pre-processed; the CNN algorithm is then applied to classify the ASD and non-ASD, and the steps of implementing the CNN algorithm are clearly stated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The implementation of the K-Means Clustering algorithm for detecting the level of spread of COVID-19 data in Indonesia by using the parameter k=3 is quite good with areas in Indonesia that have a high the spread of COVID-19 and the results of the cluster validity test get silhouette values on O = (Total Case, Total Death) and P = (Total Case, Total Death, Total Recovered) have the same cluster value, which is 0.93 which means the cluster quality is very good.…”
    Get full text
    Get full text
    Book Section
  10. 10

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…Machine learning approaches have been widely used to increase the effectiveness of intrusion detection platforms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Voltage Variation Analysis By Using Gabor Transform by Abdullah, Abdul Rahim, Tee, Wei Hown, Yusoff, Mohd Rahimi

    Published 2019
    “…The voltage variation signals are successfully detected by using the K-Nearest Neighbors (kNN) algorithm with the implementation of signal parameters extracted as the input on the classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod by Mahmod, Nurzaima

    Published 2010
    “…This method provides magnificent speed up over than traditional sequential implementation methods while it sensitivity detection is still remained. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…Hence, the main objective of this research is to address the feasibility and demonstrate the potential of DM in SHM, as well as apply DM technology which includes machine learning, artificial intelligence and statistical methods for damage detection of a lab-scale slab-on-girder bridge and four steel I beams structures using dynamic parameters of structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…The information gathered is useful for Authorities, concession expressway company and interest party for better road maintenance implementation.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation by Eissa, Magdy Abdullah, Sali, Aduwati, Ahmad, Faisul Arif, Darwish, Rania R.

    Published 2021
    “…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
    Get full text
    Get full text
    Article
  17. 17

    Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data by Qidwai, U., Malik, A.S., Shakir, M.

    Published 2014
    “…The algorithm also utilizes certain statistical features from the EEG signal that are used as features to the classifier logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani by Ghani, Mazuraini

    Published 2005
    “…This project is all about implementing the back-propagation neural network algorithm in classification of face expression. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Mobile robot safe navigation in unknown environment by Shayestegan, Mohsen, Marhaban, Mohammad Hamiruce

    Published 2012
    “…Due to its ability and effortlessness for real-time implementation, fuzzy controller has been used for the proposed navigation strategy. …”
    Get full text
    Conference or Workshop Item