Search Results - _ contribution ((function algorithm) OR (detection algorithm))
Search alternatives:
-
1
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
2
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Functional test is a standard testing procedure to determine the functionality of the memory by performing a sequence of read write operations to detect faults. …”
Get full text
Get full text
Thesis -
3
A comparative analysis of machine learning algorithms for diabetes prediction
Published 2024“…The study contributes insights into the importance of pre-processing and feature selection in improving algorithm performance. …”
Get full text
Get full text
Get full text
Article -
4
Smart and energy aware routing for the internet of mobile things
Published 2021“…The network simulation process is run in the CupCarbon software which is known as a smart city & IoT wireless sensor network simulator. The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Apart from that, the proposed algorithm would also contribute to cancer-related issues upon verifying the relevancy of particular genes via technical analysis from a medical perspective and would be utilised in feature selection applications…”
Get full text
Get full text
Get full text
Article -
6
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…Thus, this system aims to solve the problems, by developing mobile navigation with safety features by taking UTeM campus as our scope of the study. The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
7
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
8
AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR
Published 2013“…This study shows that this algorithm could add more value to the function of thin blood smear by eliminating the separated processes of detecting and counting parasitemia using two types of blood smears. …”
Get full text
Get full text
Final Year Project -
9
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The contributions of this study straddle research perspectives of enhancing Regression Testing with Particle Swarm-Artificial Bee Colony Algorithm, and practical perspectives by providing software testing practitioners the TCP framework that can facilitate and accelerate the production of high-quality software products by revealing faults early and reducing time, cost, and human efforts through automation.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Hybrid firefly algorithm and you only look once v8 framework (FA-YOLOv8) for traffic light detection
Published 2026“…This study introduces a novel hybrid framework that integrates the Firefly Algorithm (FA) with You Only Look Once version 8 (YOLOv8), termed FA-YOLOv8, to enhance accuracy and precision in traffic light detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The whole constraint analyzer and the fitness function were combined with four SBTs (genetic algorithm, evolutionary algorithm, simulating annealing, and quantum genetic algorithm). …”
Get full text
Get full text
Get full text
Thesis -
12
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
13
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…STDP algorithm) has learning capability in memory recall. …”
Get full text
Get full text
Monograph -
14
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Automatic spike detection and correction for outdoor machine vision: application to tomato
Published 2011“…Then by the use of mean shift color segmentation algorithm, the spiky pixels on the surface of tomato are spotted. …”
Get full text
Get full text
Get full text
Article -
16
Early tube leak detection system for steam boiler at KEV power plant
Published 2023Conference Paper -
17
Analysis of banana plant health using machine learning techniques
Published 2024“…This manuscript examines the prediction and detection of diseases in banana leaves, exploring various diseases, machine learning algorithms, and methodologies. …”
Get full text
Get full text
Get full text
Article -
18
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
Get full text
Get full text
Thesis -
19
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
The reliability of halal product transportation using GPS tracking system
Published 2016“…Aiming at monitoring and reducing the possibility of cross contamination that might occur during the transportation process, the Halaltracer tracking system was developed using the combinations of Global Positioning System (GPS) and geofence algorithm. The Halaltracer tracking system is significantly contributing in terms of automatic detection on the spatial activity taken during the halal product’s shipment process. …”
Get full text
Get full text
Get full text
Article
