Search Results - ((((reconstruction algorithm) OR (selection algorithm))) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    SMART: a subspace based malicious peers detection algorithm for P2P systems by Wei, Xianglin, Fan, Jianhua, Chen, Ming, Ahmed, Tarem, Pathan, Al-Sakib Khan

    Published 2013
    “…Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. SMART first reconstructs the original reputation matrix based on subspace method, and then finds malicious peers out based on Shewhart control chart. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks by Abualsaud, Khalid, Mahmuddin, Massudi, Saleh, Mohammad, Mohamed, Amr

    Published 2014
    “…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Quantitative analysis evaluation of image reconstruction algorithms between digital and analog PET-CT by Chen, Ew-Jun *, Haniff Shazwan, Safwan Selvam, Lee, Hee Siang, Chew, Ming Tsuey *

    Published 2023
    “…Results demonstrate that both OSEM and HYPER DPR reconstruction algorithms in digital PET-CT has greater spatial resolution, increased detection sensitivity and less image noise when compared to analog PET-CT. …”
    Get full text
    Get full text
    Article
  4. 4

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Subspace Techniques for Brain Signal Enhancement by Kamel , Nidal, Yusoff, Mohd Zuki

    Published 2009
    “…Later, the performance of the algorithms is assessed in their abilities to detect the latencies of the P100, P200 and P300 components. …”
    Get full text
    Get full text
    Book Section
  6. 6

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The aim of this study is to propose enhanced algorithms to be used to interpret and reconstruct a sketch, and then to produce a threedimensional model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO by MAHABADI, SEYED ALI KASAEIZADEH MAHABADI

    Published 2010
    “…By comparing current local correspondence method and discussing their weakness and strength, this research tries to enhance an algorithm to improve previous works to achieve fast detection, less costly and acceptable accuracy to meet the requirement of reconstruction. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article
  12. 12

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  13. 13

    CT reconstruction algorithm and low contrast detectability of phantom study: a systematic review and meta-analysis by Yusof, Nur Aimi Adibah, Abdul Karim, Muhammad Khalis, Mohd Asikin, Nursyazalina, Paiman, Suriati, Awang Kechik, Mohd Mustafa, Abd Rahman, Mohd Amiruddin, Mohd Noor, Noramaliza

    Published 2022
    “…Methods: In this study, a systematic review and a meta-analysis study were conducted on CT phantom for resolution study especially based on the low contrast detectability (LCD). Furthermore, the association between the CT parameter such as tube voltage and the type of reconstruction algorithm, the amount of phantom scanning affecting the image quality and the exposure dose were also investigated in this study. …”
    Get full text
    Get full text
    Article
  14. 14

    Shape Reconstruction using Overset Grid Generation Method with an Iterative Inversion Technique by Azarina, Binti Azman

    Published 2020
    “…The reconstruction results demonstrated that the FBTS technique utilizing OGG-FDTD method has the ability to detect and reconstructed embedded object.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Extraction and reconstruction of retinal vasculature by M.H.A., Fadzil, L.I., Izhar, P.A., Venkatachalam, T.V.N., Karunakar

    Published 2007
    “…This paper presents the development of an image processing algorithm for detecting and reconstructing retinal vasculature. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  16. 16
  17. 17

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction by Hui, Ng Suk

    Published 2024
    “…Q.Clear, a Bayesian Penalised Likelihood (BPL) algorithm, has demonstrated notable advancements in clinical image quality and quantification, particularly in detecting subtle abnormalities. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Reconstruction Algorithm In Ofdm System by Hwong, Sing Pui

    Published 2017
    “…Consequently, various widely used compressive sensing reconstruction algorithm such as: Orthogonal Matching Pursuit (OMP), Compressed Sensing Matching Pursuit (CoSaMP), and Subspace Pursuit (SP) will be evaluated to test their efficacy sparse estimation performances in OFDM system.…”
    Get full text
    Get full text
    Monograph
  20. 20

    Natural images contour segmentation / Khairul Adilah Ahmad, Sharifah Lailee Syed Abdullah and Mahmod Othman by Ahmad, Khairul Adilah, Syed Abdullah, Sharifah Lailee, Othman, Mahmod

    Published 2017
    “…Second step is the adoption of Laplacian of Gaussian edge detection and a new corner template detection algorithm for adjustment of the pixels along the edge map in the interpolation process. …”
    Get full text
    Get full text
    Get full text
    Article