Search Results - (( based detection method algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- method algorithm »
- based detection »
- using algorithm »
-
1
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
2
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
3
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
Get full text
Get full text
Article -
4
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Gun detection system using Yolov3
Published 2019“…The objective of this paper is to visually detect the handgun in real time videos. The proposed method is using YOLO-V3 algorithm and comparing the number of false positive and false negative with Faster RCNN algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
7
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper -
8
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Article -
9
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. …”
Get full text
Get full text
Get full text
Article -
10
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
13
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
14
Subspace Techniques for Brain Signal Enhancement
Published 2009“…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
Get full text
Get full text
Book Section -
15
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
Published 2023“…This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. …”
Article -
16
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…The detection of semantic-based text anomaly is an interesting research area which has gained considerable attention from the data mining community. …”
Get full text
Get full text
Get full text
Thesis -
17
A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies
Published 2010“…Further, GSA has been compared with a third-order correlation (TOC) method, using both realistic simulation and real patient data gathered in a hospital. …”
Get full text
Get full text
Get full text
Citation Index Journal -
18
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
19
-
20
