Search Results - (feed OR need)-software ((section algorithm) OR (detection algorithm))

Refine Results
  1. 1

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…As the amount of image data generated by NECT is massive, Deep Learning (DL) solutions are among the effective ways to deal with complex and large amount of cross-sectional data. Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Wind direction and speed estimation for quadrotor based gas tracking robot by Eu, Kok Seng *, Chia, Wei Zheng, Yap, Kian Meng *

    Published 2017
    “…The need to detect wind direction and speed stems from the fact that gas plumes travel downwind, but the quadrotor needs to find the source of the leak, and hence, must determine the upwind direction to locate the source. …”
    Get full text
    Book Section
  3. 3

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
    Get full text
    Get full text
    Thesis
  4. 4

    PC based passive infrared detector for the determination of human presence / Ahmad Latfi Salim by Salim, Ahmad Latfi

    Published 1994
    “…Sections 1, introduces the needs for automation in the detection of the presence of human beings in the security sector. …”
    Get full text
    Get full text
    Student Project
  5. 5
  6. 6
  7. 7

    Distribution network fault section estimation using analytical database approach by Mokhtar, Ahmad Safawi

    Published 2004
    “…This thesis describes the development or a new fault section estimation algorithm in a distribution network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Salivary based sers analysis in recognition of ns1 for pcasvm classification of dengue fever / Afaf Rozan Mohd Radzol by Mohd Radzol, Afaf Rozan

    Published 2018
    “…ELISA is the most common technique used to detect NS1 from patients' blood serum. However, this technique suffers from limitations such as being invasive, delayed diagnosis, tedious sample preparation, in need of seasoned laboratory, technician and bulky expensive laboratory equipment. …”
    Get full text
    Get full text
    Book Section
  9. 9

    A state of the art comparison of databases for facial occlusion by Fatma Susilawati, Mohamad, Abdulganiyu, Abdu Yusuf, Zahraddeen, Sufyanu

    Published 2015
    “…There are various face databases available to researchers for face detection and recognition. These databases are customized for a particular need of one algorithm. …”
    Get full text
    Get full text
    Article
  10. 10

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of novel distance relay scheme to prevent false tripping during power swing / Nor Zulaily Mohamad by Mohamad, Nor Zulaily

    Published 2017
    “…The initial work carried out in this study focuses on developing a new detection scheme that able to detect a fault that occurs during power swing. …”
    Get full text
    Get full text
    Book Section
  12. 12
  13. 13

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The occurrence of accidents and errors resulting from drowsiness has underscored the need for effective detection technologies to mitigate these risks. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The occurrence of accidents and errors resulting from drowsiness has underscored the need for effective detection technologies to mitigate these risks. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Passive forward scatter radar based on LTE signal for vehicle detection and classification by Abdul Aziz, Noor Hafizah

    Published 2018
    “…This thesis clarifies in details the LTE based passive forward scatter radar receiver circuit, the detection scheme and the classification algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…All the features of emphasized words detect by user is extracted. After detection of emphasized and non-emphasized words for speakerl and speaker2, intensity and pitch features need to be evaluated. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…The current work proposes a technique to detect Botnet attacks using a feed-forward backpropagation artificial neural network. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Charge-coupled device based on optical tomography system in detecting solid and transparent objects in non-flowing crystal clear water by Juliza Jamaludin, Rahim, RA, Rahim, HBA, Rahiman, MHF, Rohani, JM, Muji, SZBM

    Published 2024
    “…Experiments in detecting static solid, transparent objects and moving air bubbles are conducted. …”
    Article
  20. 20

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
    Get full text
    Get full text
    Get full text
    Article