Search Results - (feed OR need)-software ((((electron algorithm) OR (function algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Neural network algorithm-based fall detection modelling
Published 2020“…However, the improvement of model accuracy is still needed. This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain
Published 2020“…For the future work, this system need to be improved by using dataset that are related to the ASD and by using other classification algorithm.…”
Get full text
Get full text
Thesis -
3
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…The effectiveness of the framework algorithm is shown through lemma proof. © 2016 IEEE.…”
Get full text
Get full text
Article -
4
Early detection of anxiety in social media using Convolution neural network / Mohd Tharwan Hadi Ruslan
Published 2021“…But since most people need to stay at home, then by no mean detecting mental health patient will be difficult. …”
Get full text
Get full text
Thesis -
5
Development of an automated multidirectional pest sampling detection system using motorized sticky traps
Published 2021“…Different kernel functions, such as disk, diamond, square, and sphere, were used as matching functions for the insect detection and counting algorithm. …”
Get full text
Get full text
Get full text
Article -
6
AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR
Published 2013“…This study shows that this algorithm could add more value to the function of thin blood smear by eliminating the separated processes of detecting and counting parasitemia using two types of blood smears. …”
Get full text
Get full text
Final Year Project -
7
A multimodal biometric detection system via rotated histograms using hough lines
Published 2015“…The new system outperformed many methods in the literature reported using conventional detection methods. Hence, the modified algorithm is applicable in multi-biometrics detection prior to recognition especially where little computation and fast performance is highly demanded.…”
Get full text
Get full text
Article -
8
A security payment model for financial payment using mykad
Published 2011“…However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
RFID data reliability optimiser based on two dimensions bloom filter
Published 2017“…The noise and duplicate data filtering algorithm was constructed based on bloom filter. There are two bloom filters in one algorithm where each filter holds function either to remove noise data and to recognize data as correct reading from duplicate data reading. …”
Get full text
Get full text
Article -
10
Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review
Published 2021“…In addition, the manual segmentation is subjective depending on the expert's experience. Hence, the need to develop automatic segmentation algorithms has rapidly increased along with the increased need of diagnostic tools for assisting medical practitioners, especially in the absence of radiologists. …”
Get full text
Get full text
Article -
11
Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review
Published 2021“…In addition, the manual segmentation is subjective depending on the expert's experience. Hence, the need to develop automatic segmentation algorithms has rapidly increased along with the increased need of diagnostic tools for assisting medical practitioners, especially in the absence of radiologists. …”
Get full text
Get full text
Article -
12
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
Get full text
Get full text
Thesis -
14
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
15
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Therefore, the performance of the existing algorithms needs to be improved both in sequential and parallel to enhance the speed of the detection engine used in SNORT-NIDS. …”
Get full text
Get full text
Thesis -
16
Design and implementation of an object-following system by using DJI Tello drone
Published 2025“…The core functionality involves designing and testing an algorithm that processes the video feed from the drone’s camera and transmits flight commands to the drone's controller. …”
Get full text
Get full text
Get full text
Article -
17
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
18
Design And Implementation of an Object-Following System by Using DJI Tello Drone
Published 2026journal::journal article -
19
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
20
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
Get full text
Get full text
Thesis
