Search Results - ((((extraction algorithm) OR (control algorithm))) OR (detection algorithm))
Search alternatives:
- extraction algorithm »
-
1
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The features of flow-based network traffic are extracted for behavior analysis with port-wise profiling based on the data baseline, and anomaly detection classification and prediction using machine learning algorithms are performed.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
3
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…The experiment investigations elucidate that the proposed feature extraction algorithms give very promising classification accuracy for the classification of normal and pathological voices under controlled and noisy environment. …”
Get full text
Thesis -
4
Malaysian license plate number detection based on sobel vertical edge algorithm / Siti Nor Azimah Ibrahim
Published 2007“…The system captures the images of the vehicles with a digital camera. An algorithm for the detection of license plate has been designed and an algorithm for filter the detected edge is proposed for future process which is plate number extraction This project describes the method used by a computer to convert digital images of vehicles license plate into electronic text. …”
Get full text
Get full text
Thesis -
5
A modified digital hysteresis and artificial neural network (ANN) algorithms in single phase shunt active power filter control
Published 2014“…This paper introduces a new effective algorithms for the compensation of this ill effects in the power networks namely the digital hysteresis algorithm with a modification by bandwidth absence in the switching analysis (called bandless digital hysteresis algorithm) and a modified artificial neural network responsible to detect and generate the necessary compensation signal injected on to the power networks by the harmonic agents. …”
Get full text
Get full text
Conference or Workshop Item -
6
QUAD FLAT NO-LEAD (QFN) DEVICE FAULTY DETECTION USING GABOR WAVELETS
Published 2014“…Computer vision inspection system using image processing algorithms have been utilized by many manufacturing companies as a method of quality control. …”
Get full text
Get full text
Final Year Project -
7
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
8
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
9
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
10
Square groove detection based on Förstner with canny edge operator using laser vision sensor
Published 2023“…The acquired detection results are sufciently accurate, with maximum relative errors of less than 3.19%, demonstrating the rationale of the suggested visual sensor’s physical design and the validity of the proposed detection algorithms…”
Get full text
Get full text
Get full text
Article -
11
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
12
Quality inspection of engraved image using based matching approach
Published 2011“…Several objects are engraved on the acrylic souvenir bases with different color background to test the algorithm. This experiment result shows that the algorithm works better with detection rate of 100% and matching accuracy of more than 98%. …”
Get full text
Get full text
Conference or Workshop Item -
13
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
Get full text
Get full text
Get full text
Thesis -
14
Particle swarm optimization with deep learning for human action recognition
Published 2021“…Also, the current motion target detection algorithms extract features from the relevant object only if the moving object has complex texture features. …”
Get full text
Get full text
Article -
15
-
16
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Autonomous person-following telepresence robot using monocular camera and deep learning YOLO
Published 2024“…The estimated width information of the detected person is extracted from the bounding box generated by YOLO. …”
Get full text
Get full text
Get full text
Article -
18
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…In the first phase, individual biometrics recognition algorithms were developed for each biometrics feature. …”
Get full text
Get full text
Get full text
Monograph -
19
Fast-varying flicker mitigation using D-statcom and its identification / Nur Fadhilah Jamaludin
Published 2015“…In this study, it is found that the proposed new control algorithm for D-STATCOM based on PLL controller together with HCC switching has been able to produce a better result as compared to the previous techniques in term of time response. …”
Get full text
Get full text
Thesis -
20
Shunt active power filter with modified synchronous reference frame technique and fuzzy logic current controller for harmonic mitigation
Published 2017“…First, harmonic extraction using SRF for three-phase three-wire system introduces a band pass filter, and second, simple three membership functions in fuzzy logic controller for inputs and five outputs are designed to improve performance of the switching algorithm. …”
Get full text
Get full text
Thesis
