Search Results - (( basic detection ((_ algorithm) OR (based algorithm)) ) OR ( java implication tree algorithm ))
Search alternatives:
- java implication »
- implication tree »
- basic detection »
- tree algorithm »
-
1
-
2
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Shot boundary detection based on orthogonal polynomial
Published 2019“…Finally, the support vector machine is utilized to detect hard transitions. In addition, a comparison between the proposed algorithm and other state-of-the-art algorithms is performed to reinforce the capability of the proposed work. …”
Get full text
Get full text
Get full text
Article -
4
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Third, extract the boundary of image. Then, these algorithms have been applied on the image. It is conclude that the FAST algorithm is better than Harris algorithm in terms of the amount of corner point detection and run time.…”
Get full text
Get full text
Thesis -
5
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Monograph -
6
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
7
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
8
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
9
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
10
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
11
Development of control algorithm for a new 12s-6p single phase field excited flux switching motor
Published 2020“…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
13
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
14
Particle Swarm Optimization algorithm for facial emotion detection
Published 2010Get full text
Working Paper -
15
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Get full text
Thesis -
19
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
20
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project
