Search Results - (( based evaluation methods algorithm ) OR ( based detection method algorithm ))
Search alternatives:
- evaluation methods »
- methods algorithm »
- based evaluation »
- method algorithm »
- based detection »
-
1
-
2
-
3
Improved Switching-Basedmedian Filter For Impulse Noise Removal
Published 2013“…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
Get full text
Get full text
Thesis -
4
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Evaluation was made based on various evaluation metrics related to outlier detection and clustering quality. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…As a result, there has been a growing interest among researchers in developing automated methods for estimating chew count. This article reviews the existing approaches, evaluates their effectiveness, and proposes a new approach based on optimization technique. …”
Get full text
Get full text
Article -
6
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…As a result, there has been a growing interest among researchers in developing automated methods for estimating chew count. This article reviews the existing approaches, evaluates their effectiveness, and proposes a new approach based on optimization technique. …”
Get full text
Get full text
Get full text
Article -
7
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…Also, the performance of the proposed method is compared with the original ResNet algorithm and other deep learning-based and ANFIS-based methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
Get full text
Get full text
Thesis -
10
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Fast temporal video segmentation based on Krawtchouk-Tchebichef moments
Published 2020“…The proposed algorithm is based on orthogonal moments which are considered as features to detect transitions. …”
Get full text
Get full text
Get full text
Article -
12
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…Regarding the detection, a post processing method based on a combination of pixel-based and objects-based methods was proposed. …”
Get full text
Get full text
Thesis -
13
Failure detection analysis of grid-connected photovoltaic system using an improved comparative based method / Fatin Azirah Mohd Shukor
Published 2022“…Numerous studies have reported FD analysis algorithm using comparative based method (CBM), but limitedly demonstrate the FD analysis sequence that will finally determine the type of failure occurred in the GCPV system. …”
Get full text
Get full text
Thesis -
14
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
15
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
17
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
Get full text
Get full text
Get full text
Thesis -
18
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The performance of algorithms was measured based on classification accuracy, error rate, and precision and recall. …”
Get full text
Get full text
Thesis -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis
