Search Results - (( basic detection method algorithm ) OR ( using application based algorithm ))
Search alternatives:
- using application »
- application based »
- method algorithm »
- basic detection »
-
1
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
3
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
5
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
Get full text
Get full text
Thesis -
6
Development of a new nonlinear filtering algorithm for impulse noise reduction
Published 2020Get full text
Get full text
Research Report -
7
Retrieval based on skin color to detect the malicious images
Published 2009“…There still a lot of current algorithms are quite successful in using low-level features of the images such as color histogram and texture. …”
Get full text
Get full text
Get full text
Research Report -
8
Development of land target following system of hexacopter
Published 2015“…A few experiments were conducted to get the performance of the methods focusing on color detection algorithms. The results of the experiments show that different approach angle and lighting of the hexacopter will result in different level of accuracy of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
10
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…We propose a modified reweighted fast consistent and high breakdown point (MRFCH) estimator to make it applicable to high-dimensional settings. The basic idea of our proposed method is to modify the Mahalanobis distance so that it uses only the diagonal elements of the scatter matrix in the computation of the RFCH algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Face Detection System / Chan Beh Teng
Published 2004“…The method used for detecting face is a combination of color based technique and template matching. …”
Get full text
Get full text
Thesis -
13
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Review of Wheat Disease Classification and Severity Detection Models
Published 2023“…This paper mainly aims to explain deep learning-based wheat diseases identification algorithm, and to discuss the benefits and drawbacks of present wheat disease detection approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
Get full text
Get full text
Thesis -
16
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Various multi resolution techniques are used that include wavelet based spectrum estimation and spectral hole detection, wavelet based multi-resolution in analog domain and multi-resolution multiple antenna based detection. …”
Get full text
Get full text
Thesis -
17
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
18
Wifi positioning system / Amalina Abdul Halim
Published 2006“…This paper present the experimental results that demonstrate the ability of Wifi Positioning system to estimate location of the devices using K-NN algorithm and result in application part is shown based on highest percentage accuracy of time taken to intend bus stop.…”
Get full text
Student Project -
19
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
20
The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer
Published 2023“…Moreover, this paper also defined the basic requirements for creating a skin cancer detection application, which revolves around two main issues: the full segmentation image and the tracking of the lesion on the skin using deep learning. …”
Get full text
Get full text
Get full text
Article
