Search Results - flow ((selection algorithm) OR (detection algorithm))
Search alternatives:
- flow »
- selection »
-
1
Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment
Published 2017“…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
Get full text
Get full text
Thesis -
2
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis -
3
Fault section detection and location on distribution network using analytical voltage sags database
Published 2006“…By doing this all the possible sections due to the fault can be selected. Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
Get full text
Get full text
Conference or Workshop Item -
4
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
5
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
Get full text
Get full text
Get full text
Article -
6
Video Object Avoidance Implementation on Embedded Platform
Published 2015“…In this project, there are two motion detection techniques being studied, namely optical flow and motion templates. …”
Get full text
Get full text
Final Year Project -
7
Video surveillance: Item monitoring against theft
Published 2023“…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
9
Online simulation to monitor multiphase flow using laser source as transmitter
Published 2021“…This research presents an application of optical tomography for the detection of gas bubbles flowing in a liquid medium. …”
Get full text
Get full text
Get full text
Article -
10
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…The proposed EFDT and hybrid DT-SVM algorithms show a high capability of SDN applications to offer fast detection and classification of conflict flows…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
Get full text
Get full text
Get full text
Article -
13
Imaging of solid flow in a gravity flow rig using infra-red tomography
Published 2005“…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
Get full text
Get full text
Thesis -
14
Online Simulation To Monitor Multiphase Flow Using Laser Source As Transmitter
Published 2024journal::journal article -
15
Fish pellet measurement system for food industry
Published 2025“…Then, the image will be processed in a trained model to detect the fish pellet. Then, an algorithm will be used to determine the fish pellet's diameter based on the result of the detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
Artificial neural network for anomalies detection in distillation column
Published 2017“…The effect of these faults on process variables i.e. changes in distillate and bottom composition, distillate and bottom temperature, bottom flow rate, and the pressure drop is observed. The network is trained using back propagation algorithm to determine root mean square error (RMSE). …”
Get full text
Get full text
Article -
19
Detection of the river sediment deposition area at Kuala Perlis river mouth using Landsat 8 OLI within the years 2019, 2020 and 2021 / Nur Zakira Ain Zamrun
Published 2022“…Quantification of Landsat 8 OLI satellite images was applied using ENVI software on the study area for detecting sedimentation in the study area that used image data band correlation in deposited river sediment through unsupervised classifier algorithm and selection of spectral bands for MNDWI. …”
Get full text
Get full text
Thesis -
20
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis
