Search Results - different ((((electron algorithm) OR (function algorithm))) OR (detection algorithm))

Refine Results
  1. 1

    Neural network algorithm-based fall detection modelling by Mohd Yusoff, Ainul Husna, Koh, Cheng Zhi, Ngadimon, Khairulnizam, Md Salleh, Salihatun

    Published 2020
    “…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Clonal selection algorithm for the cryptanalysis of a simple substitution cipher by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza

    Published 2006
    “…The performance of CSA and Genetic Algorithm (GA) is studied by comparing the number of correct characters and the progress of fitness values using different population sizes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…Based on the simulation, EIED backoff algorithm gave better performance in term of average delay compare to other algorithms. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…We then develop a new algorithm to address the summarizing strategies identification problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of an automated multidirectional pest sampling detection system using motorized sticky traps by Hadi, Mustafa Kareem, Mohd Kassim, Muhamad Saufi, Wayayok, Aimrun

    Published 2021
    “…Different kernel functions, such as disk, diamond, square, and sphere, were used as matching functions for the insect detection and counting algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Hybrid firefly algorithm and you only look once v8 framework (FA-YOLOv8) for traffic light detection by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad, Zalili, Musa

    Published 2026
    “…This study introduces a novel hybrid framework that integrates the Firefly Algorithm (FA) with You Only Look Once version 8 (YOLOv8), termed FA-YOLOv8, to enhance accuracy and precision in traffic light detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis by Melhim, Loai Kayed Hassan Bani

    Published 2012
    “…LBDF is equipped with a ‘malicious-scanning’ detection algorithm. The LBDF algorithm uses SYN, ACK (SNAK) rules to reduce the volume of network captured traffic and to convert the reduced traffic into discrete time sequences. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…Experimental results show that their approaches significantly improve the performance of protein remote protein homology detection for all three different datasets (SCOP 1.53, 1.67 and 1.73). …”
    Get full text
    Get full text
    Monograph
  15. 15

    Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review by Khan, Z., Yahya, N., Alsaih, K., Al-Hiyali, M.I., Meriaudeau, F.

    Published 2021
    “…Particular attention is given to different loss functions used for training segmentation based on deep learning techniques. …”
    Get full text
    Get full text
    Article
  16. 16

    Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review by Khan, Z., Yahya, N., Alsaih, K., Al-Hiyali, M.I., Meriaudeau, F.

    Published 2021
    “…Particular attention is given to different loss functions used for training segmentation based on deep learning techniques. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Human odour detection approach using machine learning by Ahmed Qusay Sabri

    Published 2019
    “…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project