Search Results - (( basic detection method algorithm ) OR ( using solution using algorithm ))
Search alternatives:
- method algorithm »
- basic detection »
- using algorithm »
- using solution »
- solution using »
-
1
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
2
Cars detection in stitched image using morphological approach
Published 2017“…The method is improved by using algorithm which removes noise by sizes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
3
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…An approach that detects steady state value for calling genetic algorithm (GA) is proposed to overcome the problems of good classifiers deletion and the local minima trap. …”
Get full text
Get full text
Thesis -
4
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Power System State Estimation In Large-Scale Networks
Published 2010“…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
Get full text
Get full text
Thesis -
6
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…The tracking algorithm determines the angles which are used to determine the position of solar tracker. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…The application of orthogonal decomposition method using Householder transformation (refer to section 3.3) is used to solve the least-squares problem in power system state estimation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation
Published 2016“…In this study an efficient micro-crack inspector comprising near infrared illumination and an improved Niblack segmentation algorithm is proposed. Empirical and visual results demonstrate that the proposed solutions are competitive when compared to existing Niblack thresholding formulas and other standard methods, and achieve better precision and performance in terms of Pratt’s figure of merit and other evaluation methods. …”
Get full text
Get full text
Thesis -
10
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
11
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
12
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
13
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
16
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
17
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
18
Retrieval based on skin color to detect the malicious images
Published 2009Get full text
Get full text
Get full text
Research Report -
19
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
Published 2022Get full text
Get full text
Undergraduates Project Papers -
20
INVESTIGATION OF CANNY TECHNIQUE FOR EDGE DETECTION IN IMAGE PROCESSING
Published 2004“…The aim of this project is to investigate the Canny technique for edge detection in detail. Then, a comparison of various methods for edge detection is made. …”
Get full text
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
