Search Results - (( basic detection search algorithm ) OR ( using codification using algorithm ))
Search alternatives:
- using codification »
- codification using »
- detection search »
- basic detection »
- using algorithm »
-
1
Particle Swarm Optimization algorithm for facial emotion detection
Published 2010Get full text
Working Paper -
2
An ensemble feature selection method to detect web spam
Published 2018“…With regard to increasing available information in virtual space and the need of users to search, the role of search engines and used algorithms are important in terms of ranking. …”
Get full text
Get full text
Get full text
Article -
3
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
4
Facial emotion detection using Guided Particle Swarm Optimization (GPSO)
Published 2009Get full text
Working Paper -
5
-
6
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
7
Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms
Published 2012“…This paper presents a method to improve the raw disparity maps in the disparity refinement stage for stereo matching algorithm. The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
Get full text
Get full text
Get full text
Article -
8
Retrieval based on skin color to detect the malicious images
Published 2009Get full text
Get full text
Get full text
Research Report -
9
Abnormal event detection in video surveillance / Lim Mei Kuan
Published 2014“…Therefore, by considering tracking as an optimisation problem, the proposed SwATrack algorithm searches for the optimal distribution of motion model without making prior assumptions, or prior learning of the motion model. …”
Get full text
Get full text
Thesis -
10
-
11
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 377$ 3(53867$.$$1781.8781$0,1$+ average over the testing period. …”
Get full text
Get full text
Thesis -
12
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Attempts have been made to resolve all of these issues by using several methods such as: full text searching, text indexing, a database schema management, database data model, and query-based techniques. …”
Get full text
Get full text
Thesis -
13
Discriminative feature representation for Malay children’s speech recognition / Seyedmostafa Mirhassani
Published 2015“…In case of multiple filterbanks the cepstral features are used in different experts for performing classification based on different representation of speeches. …”
Get full text
Get full text
Thesis -
14
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
