Search Results - ((((selection OR section) OR electron) algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Segmentation of Lung Region in Computed Tomography (CT) Images by Mohd Bokeri, Husna Adila

    Published 2015
    “…With 39 top and 37 bottom section lung images, the algorithm give yy43% and 82.05% correct segmentation of lung. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition by Othman, Mahmod, Syed Abdullah, Sharifah Lailee, Ahmad, Khairul Adilah, Abu Bakar, Mohd Nazari, Mansor, Ab Razak

    Published 2016
    “…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Solving time gap problems through the optimization of detecting stepping stone algorithm by Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2004
    “…It is found that current algorithm of detecting stepping stone is not optimized. …”
    Get full text
    Get full text
    Book Section
  4. 4

    Fault section detection and location on distribution network using analytical voltage sags database by Khalid, A.R., Mokhlis, Hazlie, Li, H.

    Published 2006
    “…By doing this all the possible sections due to the fault can be selected. Finally, the most probable faulty section is identified using probability approach.This paper presents the implemented algorithms and the test of the algorithms on typical distribution networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
    Get full text
    Article
  9. 9

    Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm by Zuwairie, Ibrahim, Mohd Zaidi, Mohd Tumari, Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Mohd Ibrahim, Shapiai

    Published 2014
    “…Using GSA, the parameter estimation of the classifier and the peak feature selection can be done simultaneously. Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…The Information Gain algorithm is used to select the most significant permissions, then the classification algorithms Naïve Bayes, Random Forest and J48 used to classify the Android apps as botnet or benign apps. …”
    Get full text
    Get full text
    Article
  12. 12

    Extremal Region Selection for MSER Detection in Food Recognition by Mohd Norhisham Razali @ Ghazali, Noridayu Manshor, Alfian Abdul Halin, Norwati Mustapha, Razali Yaakob

    Published 2021
    “…Therefore, this research proposes an Extremal Region Selection (ERS) algorithm to improve MSER detection by reducing the number of irrelevant extremal regions by using unsupervised learning based on the k-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Article
  14. 14
  15. 15

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Generally, a large number of features are required to be selected for training purposes of face detection system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms by Ahmed, Tarem, Ahmed, Supriyo, Pathan, Al-Sakib Khan

    Published 2014
    “…number of algorithms have been recently proposed for automatic intruder detection from CCTV images. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis