Search Results - (( based detection method algorithm ) OR ( based solution using algorithm ))
Search alternatives:
- method algorithm »
- based detection »
- using algorithm »
- based solution »
- solution using »
-
1
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
3
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
Get full text
Get full text
Get full text
Article -
4
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This approach integrates a conditional variational autoencoder (CVAE) to effectively balance the dataset and a stack predictor (SPFHD) that utilizes tree-based ensemble learning algorithms. The base models' predictions are integrated using a support vector machine, significantly enhancing detection accuracy. …”
Get full text
Get full text
Get full text
Thesis -
5
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
6
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
8
Neural network algorithm-based fall detection modelling
Published 2020“…This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
Get full text
Get full text
Get full text
Article -
9
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…The first proposed method uses facial landmarks to identify blinks and yawns based on suitable thresholds set for the drivers. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
11
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
12
-
13
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…Moreover, the value of the solution is evaluated based on the objective function and the Fuzzy C Means (FCM) clustering method used to provide the best results for the overlapping dataset and create the fuzzy membership search domain which includes all possible compromise solutions. …”
Get full text
Get full text
Get full text
Article -
15
LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO
Published 2010“…Correspondence is the method of detecting the real world object reflections in two camera views. …”
Get full text
Get full text
Thesis -
16
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…Several studies have provided solutions for detecting vegetation encroachment based on satellite images. …”
text::Thesis -
17
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…The PD data acquired from electrical method was used to test the FPDI. The comparison was made based on the less hardware used for detection while sustain the identification accuracy. …”
Get full text
Get full text
Thesis -
18
Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff
Published 2016“…In addition, this new algorithm is compared to color channel multi-thresholding segmentation and artificial intelligence segmentation based clustering method such as Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy cMeans (FCM). …”
Get full text
Get full text
Thesis -
19
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
20
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis
