Search Results - (( based constructive method algorithm ) OR ( set detection method algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- set detection »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…First, the grid mapping of the robot's workspace environment is constructed, and then the borders of the workspace environment are detected based on the new proposed function. …”
Get full text
Thesis -
2
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
3
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
4
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
5
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Most existing methods deal with the detection of an action after its completion. …”
Get full text
Get full text
Thesis -
6
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
7
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
8
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The results show that this method can be used for significant reduction of data set. …”
Get full text
Get full text
Thesis -
9
-
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
Get full text
Get full text
Get full text
Article -
12
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…While numerous approaches for early detection continue to evolve, the quest for innovative methods remains constant. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
14
Determining gender differential item functioning for mathematics in coeducational school culture
Published 2018“…By employing the software WINSTEPS version 3.67.0 that is based on the Rasch Model for dichotomous responses, Differential Item Functioning analysis was conducted by using Mantel-Haenszel Chi-square method. …”
Get full text
Get full text
Get full text
Article -
15
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
16
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…The objectives of this study are to pre-process the scanned images and apply the image recognition algorithm for lane detection. The study employed Canny Edge Detection and Hough Transform algorithms on several sets of images. …”
Get full text
Get full text
Get full text
Article -
17
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The Naïve-Bayes classifier and the feature sub-set selection method were analyzed and tested on two sets of data. …”
Get full text
Get full text
Get full text
Article -
18
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…It sets a great benchmark for future work on driver drowsiness detection. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
20
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise
