Search Results - (( based optimization method algorithm ) OR ( key detection method algorithm ))
Search alternatives:
-
1
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
2
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
Get full text
Get full text
Get full text
Article -
5
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
Get full text
Get full text
Get full text
Article -
6
Road damage detection for autonomous driving vehicles using YOLOv8 and salp swarm algorithm
Published 2025“…Consequently, this paper proposes a method to improve the detection accuracy of You Only Look Once version 8 (YOLOv8) using Salp Swarm Algorithm (SSA) for hyperparameter optimization, focusing on eight key parameters. …”
Get full text
Get full text
Get full text
Article -
7
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
8
Exploration and Exploitation Mechanism in Pairwise Test Case Generation: A Systematic Literature Review
Published 2025“…Covering research from 2014 to 2024, the review evaluates hybrid and metaheuristic strategies, including Pairwise Migrating Birds Optimization-Based Strategies (PMBOS), Pairwise Gravitational Search Algorithm Strategy (PGSAS), Pairwise hybrid Artificial Bee Colony (PhABC), Genetic and Particle Swarm Optimization (GAPSO) algorithm, Hybrid Optimization Algorithm (HOA), and Parameter Free Choice Function based Hyper-Heuristic (PCFHH), among others. …”
Get full text
Get full text
Article -
9
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Drawing from an extensive review of existing predictive models and cardiovascular health risk factors, this research proposes an enhanced ADAM optimization algorithm, integrated with advanced data processing and feature selection methodologies, to identify and refine key predictors for improved model performance. …”
Get full text
Get full text
Get full text
Article -
10
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
Get full text
Get full text
Get full text
Article -
11
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…When a robust mathematical model of a process equipment is available, model-based diagnostic methods can be used to identify the occurrence of faults in a system. …”
Get full text
Get full text
Article -
12
Defect detection of GFRP composites through long pulse thermography using an uncooled microbolometer infrared camera
Published 2024“…This study underscores the potential of optimized LPT as a cost-effective and reliable method for detecting defects in GFRP composites.…”
Get full text
Get full text
Get full text
Article -
13
Vibration analysis for early detection of bearing failures
Published 2024“…The algorithm's analysis results were consistent with the physical inspection of disassembled bearings. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism
Published 2025“…An original dataset, representing various cheating methods in paper-based exams, was manually compiled due to the absence of suitable open-source data. …”
Get full text
Get full text
Get full text
Thesis -
15
Modeling of road geometry and traffic accidents by hierarchical object-based and deep learning methods using laser scanning data
Published 2018“…Experimental results regarding road geometry extraction indicated that the proposed methods could achieve relatively high accuracy (~ 85% - User’s Accuracy) of road detection from airborne laser scanning data. …”
Get full text
Get full text
Get full text
Thesis -
16
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
Article -
17
-
18
Design and implementation of a deep learning based hand gesture recognition system for Rehabilitation Internet-Of-Things (RIOT) environments using MediaPipe
Published 2025“…The methodology involves the integration of MediaPipe for detecting hand landmarks and adaptive sensitivity algorithms to ensure reliable recognition across different environments, such as varying lighting and hand positions. …”
Get full text
Get full text
Get full text
Article -
19
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
20
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article
