Search Results - evolution ((((normalization techniques) OR (detection technique))) OR (computing techniques))

Refine Results
  1. 1

    Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization by Yahya, Zainor Ridzuan

    Published 2013
    “…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Critical review of object detection techniques for traffic light detection in intelligent transportation systems by Muhammad Adhwa, Mohd Salemi, Muhammad Arif, Mohamad

    Published 2025
    “…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Metric-based code smell detection technique for python software by Leeman, Samaila Ja'afaru

    Published 2018
    “…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation by Ahmadipour, Masoud

    Published 2019
    “…In this work, a new islanding detection technique is proposed based on combination of Slantlet Transform and Ridgelet Probabilistic Neural Network to detect islanding conditions from other disturbance for a 250-kW PV array connected to a typical North American distribution grid and a wind farm power generation system. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Lattice Sphere Detection Techniques In Block Data Transmission And Multiuser Wireless Systems by Albreem, Mahmoud A. M.

    Published 2013
    “…Owing to its high computational load, lattice sphere detection (LSD) technique and its variants had been proposed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A wireless precoding technique for millimetre-wave MIMO system based on SIC-MMSE by Boby, Rounakul Islam, Abdullah, Khaizuran, Jusoh, Ahmad Zamani, Parveen, Nagma, Asnawi, Ani Liza

    Published 2019
    “…To improve the conventional mm-wave MIMO nodal detection and coordination performance, the system processes data using symbolized error vector technique for linearization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Antipatterns detection approaches in object-oriented design: a literature review by Din, Jamilah, Al-Badareen, Anas Bassam, Jusoh, Yusmadi Yah

    Published 2012
    “…Design pattern detection is a useful technique for gaining knowledge on the design issues of existing systems and improves the system's comprehension, which consequently enhance the software maintainability and evolution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Iris Segmentation Analysis Using Integro-Differential Operator And Hough Transform In Biometric System by Zainal Abidin, Zaheera, Anawar, Syarulnaziah, Ayop, Zakiah, Manaf, Mazani, Shibghatullah, A.S., Mohd Yunos, S.H.A.

    Published 2012
    “…Iris segmentation is foremost part of iris recognition system.There are four steps in iris recognition: segmentation,normalization,encoding and matching.Here, iris segmentation has been implemented using Hough Transform and IntegroDifferential Operator techniques.The performance of iris recognition system depends on segmentation and normalization technique.Iris recognition systems capture an image from individual eye.Then the image captured is segmented and normalized for encoding process.The matching technique,Hamming Distance,is used to match the iris codes of iris in the database weather it is same with the newly enrolled for verification stage.These processes produce values of average circle pupil,average circle iris,error rate and edge points.The values provide acceptable measures of accuracy False Accept Rate (FAR) or False Reject Rate (FRR).Hough Transform algorithm,provide better performance,at the expense of higher computational complexity.It is used to evolve a contour that can fit to a non-circular iris boundary.However,edge information is required to control the evolution and stopping the contour.The performance of Hough Transform for CASIA database was 80.88% due to the lack of edge information.The GAR value using Hough Transform is 98.9% genuine while 98.6% through Integro-Differential Operator.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Iris Segmentation Analysis using Integro-Differential Operator and Hough Transform in Biometric System by Zainal Abidin, Zaheera, -, M.Manaf, Shibghatullah, Abdul Samad, -, S.H.A.Mohd Yunos, -, S.Anawar, -, Z.Ayop

    Published 2012
    “…The performance of iris recognition system depends on segmentation and normalization technique. Iris recognition systems capture an image from individual eye. …”
    Get full text
    Get full text
    Article
  13. 13

    Intelligent presentation slide control video (INSTRUCT) / Mohd Razif Shamsuddin, Nurzeatul Hamimah Abd Hamid and Muhammad Syafiq Jasmin by Shamsuddin, Mohd Razif, Abd Hamid, Nurzeatul Hamimah, Jasmin, Muhammad Syafiq

    Published 2012
    “…With the help of webcam, human can interact with computer by using their hand gesture. With this technique we can substitute the use of mouse or keyboard to control slide presentation. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Segmentation of Retinal Vasculature using Active Contour Models (Snakes) by Pang , Kee Yong

    Published 2009
    “…Active contour model (snake) that based on level sets, techniques of curve evolution, and Mumford-Shah functional for segmentation is then used to segment out the detected retinal vessel and produce a complete retinal vasculature. …”
    Get full text
    Final Year Project
  15. 15

    Object detection and classification using few-shot learning in smart agriculture: A scoping mini review by Nitiyaa Ragu, Jason Teo

    Published 2022
    “…Its evolution over the previous two decades can be seen as the pinnacle of computer vision advancement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An algorithmic framework for multiobjective optimization by Ganesan, T., Elamvazuthi, I., Shaari, K.Z.K., Vasant, P.

    Published 2013
    “…Various metaheuristic techniques such as differential evolution (DE), genetic algorithm (GA), gravitational search algorithm (GSA), and particle swarm optimization (PSO) have been used in conjunction with scalarization techniques such as weighted sum approach and the normal-boundary intersection (NBI) method to solve MO problems. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…There has been noteworthy research on image based steganography techniques to overcome the various challenges i.e. lower embedding capacity, imperceptibility, embedding efficiency and robustness against steganalysis detection attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis