Search Results - (( vr application based algorithm ) OR ( site ((selection based) OR (detection based)) algorithm ))

Refine Results
  1. 1

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…A modified threshold-based technique was used to build the FD algorithm based on data from PV system installed at GERC UiTM, Malaysia. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery by Aisyah Marliza Muhmad Kamarulzaman, Wan Shafrina Wan Mohd Jaafar, Siti Nor Maizah Saad, Hamdan Omar, Mohd. Rizaludin Mahmud

    Published 2021
    “…This study assessed the capability of an object-based approach on image detection to segment and merge the stumps after selective logging practice on UAV imagery with a scale of 0.06-meter resolution. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Road condition assessment by OBIA and feature selection techniques using very high-resolution WorldView-2 imagery by Shahi, Kaveh, Mohd Shafri, Helmi Zulhaidi, Hamedianfar, Alireza

    Published 2016
    “…The chi-square algorithm outperformed SVM and RF techniques. The classification result based on CHI algorithm achieved an overall accuracy of 83.19% for the training image (first site). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The segmentation process was optimized using Fuzzy-based Segmentation Parameter. Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…Among three power units in the plant, the boiler drum data of unit3 was considered. The selection of the relevant variables for the neural networks is based on merging between theoretical analysis base and the plant operator experience. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Apparently, latency is one of the most frequently cited shortcomings of current Virtual Reality (VR) applications. To compensate latency, previous prediction mechanisms insert a complex mathematical algorithm, which may not be appropriate for complex virtual training applications. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing by Hamedianfar, Alireza

    Published 2015
    “…OBIA was performed in a rule-based structure that requires selecting and identifying rules. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Based on You Only Look Once (YOLO) v5, A cloud-based real-time hardhat-wearing compliance detection system was proposed to detect workers not wearing hardhats in power construction sites. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real-time personal protective equipment compliance detection using you only look once by Nurhanisah, Aminuddin, Nor Azuana, Ramli, Pratondo, Agus

    Published 2024
    “…Further analysis comparing the selected models based on the confusion matrix shows that YOLOv8 demonstrates more accurate predictions, while YOLOv5 and YOLOv7 primarily detect background, leading to minimal object detection within the bounding boxes.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism by Yan, Zuo, Chai, Soo See, Goh, Kok Luong

    Published 2024
    “…To improve the speed of video detection, a student's abnormal-behavior detection method was proposed based on improved YOLOv8 and attention mechanism to achieve real-time detection of cheating actions in an exam room on a regular performance computer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The feature selection is introduced to select the most important from the extracted high-dimensional best features and feed the selected features into the minimum Redundancy and Maximal Relevance algorithm and apply random forest for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    LED based NIR spectroscopy for detection of lard adulteration in palm oil via chemometrics / Katrul Nadia Basri by Basri, Katrul Nadia

    Published 2017
    “…Near infrared spectroscopy technique is a reliable method to detect adulteration in cooking oil due to less sample preparation, rapid scan and applicable on on-site. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Wind direction and speed estimation for quadrotor based gas tracking robot by Eu, Kok Seng *, Chia, Wei Zheng, Yap, Kian Meng *

    Published 2017
    “…This paper proposes a quadrotor based gas tracking robot to be used in hazardous gas localization areas, and specifically, to detect methane leak from gas extraction sites. …”
    Get full text
    Book Section