Search Results - different ((((section algorithm) OR (function algorithm))) OR (detection algorithm))
Search alternatives:
-
1
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Findings shows that the propose algorithm generates different fault syndromes for SAFs and TFs hence make them distinguishable. …”
Get full text
Get full text
Thesis -
2
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. This research tries to approximate the root for ten difference function of trigonometric, polynomial, exponential and logarithmic function using five difference bracketing method which are bisection, n-section, improved n-section, newton and bisection newton like algorithm. …”
Get full text
Get full text
Thesis -
3
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
Get full text
Get full text
Get full text
Article -
4
Neural network algorithm-based fall detection modelling
Published 2020“…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
Get full text
Get full text
Get full text
Article -
5
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
6
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. …”
Get full text
Get full text
Thesis -
7
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
Get full text
Get full text
Thesis -
8
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…FPSO incorporates fuzzy edge detection technique as the initial population and the optimum membership value as the fitness function in the particle swarm optimization algorithm. …”
Get full text
Get full text
Thesis -
10
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…RSA algorithm and CRC 32 hash function will be explain in preliminaries section. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Accuracy and performance analysis for classification algorithms based on biomedical datasets
Published 2021“…This paper presents and analyzes five different machine learning (ML) algorithms: Function-based Neural Network (MLP) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…In this paper, we introduce a new adaptive DNA coinpitting algorithm by using Poiymcruse Chain Rearlion (PCR). …”
Get full text
Get full text
Book Section -
13
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
14
Comparative study of secant, Fixed point and Sixth section methods for solving root in nonlinear equation / Nik Syahrul Naim Abdul Rahman
Published 2017“…The cubic polynomial, exponential, trigonometric, and logarithm functions are nonlinear function. For each nonlinear function, there are two difference functions were tested by using code Maple 17 software. …”
Get full text
Get full text
Thesis -
15
Smart and energy aware routing for the internet of mobile things
Published 2021“…Second, four different are generated based on the scenario detected. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Signal quality measures for unsupervised blood pressure measurement
Published 2012“…The mean systolic and diastolic differences were 0.37 ± 3.31 and 3.10 ± 5.46 mmHg, respectively, when the artifact detection algorithm was utilized, with the algorithm correctly determined if the signal was clean enough to attempt an estimation of systolic or diastolic pressures in 93% of blood pressure measurements.…”
Get full text
Get full text
Get full text
Article -
17
Performance of particle swarm optimization under different range of direct current motor's moment of inertia / Mohd Azri Abdul Aziz
Published 2018“…This research investigates the effect of moment of inertia on the performance of PSO algorithm utilizing the Weighted Transient Response Index (WTRI) based fitness function in optimizing PID controller parameters to control a DC motor. …”
Get full text
Get full text
Book Section -
18
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
19
Passive forward scatter radar based on LTE signal for vehicle detection and classification
Published 2018“…This thesis clarifies in details the LTE based passive forward scatter radar receiver circuit, the detection scheme and the classification algorithm. …”
Get full text
Get full text
Thesis -
20
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…It does not utilize any token, that is similar to permission-based, and the latest node having the critical section influences the entrance of the next node to the critical section, that is similar to token-based algorithms. …”
Get full text
Get full text
Thesis
