Search Results - ((((((sift algorithm) OR (_ algorithm))) OR (svm algorithm))) OR (system algorithm))
Search alternatives:
- system algorithm »
- sift algorithm »
- svm algorithm »
-
1
Phylogenetic tree classification system using machine learning algorithm
Published 2015“…A study is conducted to develop an automated phylogenetic tree image classification system by using machine learning algorithm. This study adopted supervised machine learning algorithm which is the Support Vector Machine (SVM) for classification. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
Waste classification using support vector machine with SIFT-PCA feature extraction
Published 2020“…The performance of the SVM classification using SIFT feature is compared with the similar algorithm with SIFT-PCA combined feature. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Facial features point localization using modified SIFT scale space / Zulfikri Paidi
Published 2020Subjects: “…Algorithms…”
Get full text
Get full text
Thesis -
4
Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform
Published 2015“…Experimental results shows that SURF and SIFT are robust algorithm performing stable key point detection. …”
Get full text
Get full text
Thesis -
5
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Thesis -
6
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
7
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), and support vector machine (SVM) have been used for IDS in the last decades. …”
Get full text
Get full text
Get full text
Article -
8
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
9
A biometric fingerprint recognition system utilizing the Scale Invariant Feature Transform (SIFT) algorithm for border crossing
Published 2024Subjects:Conference Paper -
10
Panoramic image matching method for UAV remote sensing based of sift algorithm
Published 2024text::Final Year Project -
11
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
AMOR: an adaptive, multimodal architecture for visual object recognition
Published 2014“…Reka bentuk seni bina telah dirasmikan secara matematik dan algorithmically dalam bentuk "Pengkelasan'…”
Get full text
Get full text
Research Report -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain
Published 2020“…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
Get full text
Get full text
Thesis -
15
Image authentication using Scale Invariant Feature Transform (SIFT) / Nurul Anis Suriana Adnan
Published 2017Subjects: Get full text
Get full text
Thesis -
16
An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system
Published 2011“…This paper proposes a new method to trace the transmission loss in deregulated power system by applying Genetic Algorithm (GA) and Least Squares Support Vector Machine (LS-SVM). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Multispectral palm vein image fusion for contactless palm vein verification system
Published 2018“…The result shows that SIFT algorithm achieved a better recognition rate and extract more information and matching pairs compared to SURF algorithm. …”
Get full text
Get full text
Thesis -
18
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…This paper presents the analysis of real-time object detection method for embedded system particularly the Android smartphone. As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
19
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…IPJAYA in this study was used to update the C and gamma parameters of the support vector machine (SVM). Several experiments were performed on the prominent intrusion ML dataset, where significant enhancements were observed with the suggested ITLBO-IPJAYA-SVM algorithm compared with the classical TLBO and JAYA algorithms.…”
Get full text
Get full text
Get full text
Article -
20
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…This paper presents the analysis of real-time object detection method for embedded system, especially the Android smartphone. As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item
