Search Results - flow ((selection algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment by Kesavan Prabagaran, Premkumar

    Published 2017
    “…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
    Get full text
    Thesis
  3. 3

    Fault section detection and location on distribution network using analytical voltage sags database by Khalid, A.R., Mokhlis, Hazlie, Li, H.

    Published 2006
    “…By doing this all the possible sections due to the fault can be selected. Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Video Object Avoidance Implementation on Embedded Platform by Keat, Yeong Ming

    Published 2015
    “…In this project, there are two motion detection techniques being studied, namely optical flow and motion templates. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…Here, we have developed an intelligent video surveillance system that is capable of identifying the close loitering event and monitoring the select item in the scene by integrating these approaches, such as the You-Only-Look-Once (YOLO) version 5 object detection algorithm, close-contact detection, feature matching, significant movement and dissimilarity detections. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12
  13. 13

    Imaging of solid flow in a gravity flow rig using infra-red tomography by Md. Yunus, Mohd. Amri

    Published 2005
    “…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Fish pellet measurement system for food industry by Ngo, Kok Wei

    Published 2025
    “…Then, the image will be processed in a trained model to detect the fish pellet. Then, an algorithm will be used to determine the fish pellet's diameter based on the result of the detection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18

    Artificial neural network for anomalies detection in distillation column by Taqvi, S.A., Tufa, L.D., Zabiri, H., Mahadzir, S., Shah Maulud, A., Uddin, F.

    Published 2017
    “…The effect of these faults on process variables i.e. changes in distillate and bottom composition, distillate and bottom temperature, bottom flow rate, and the pressure drop is observed. The network is trained using back propagation algorithm to determine root mean square error (RMSE). …”
    Get full text
    Get full text
    Article
  19. 19

    Detection of the river sediment deposition area at Kuala Perlis river mouth using Landsat 8 OLI within the years 2019, 2020 and 2021 / Nur Zakira Ain Zamrun by Zamrun, Nur Zakira Ain

    Published 2022
    “…Quantification of Landsat 8 OLI satellite images was applied using ENVI software on the study area for detecting sedimentation in the study area that used image data band correlation in deposited river sediment through unsupervised classifier algorithm and selection of spectral bands for MNDWI. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
    Get full text
    Get full text
    Thesis