Search Results - (( case detection method algorithm ) OR ( using codification based algorithm ))
Search alternatives:
- using codification »
- codification based »
- method algorithm »
- case detection »
-
1
DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION
Published 2018“…Lastly, it is compared with other published stiction detection methods, where it performs as efficient and even better than other methods.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
-
3
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The results were statically analyzed using t-test to show the significance of the proposed method compared to the existing methods. The results show that the proposed infeasible path detection method was efficient and detect 99 percent of the infeasible paths in the three industrial systems. …”
Get full text
Get full text
Get full text
Thesis -
4
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023“…Also, it is shown that the algorithm is very effective in case of noisy and blurs images. � 2010 IEEE.…”
Conference Paper -
5
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
Get full text
Get full text
Get full text
Article -
6
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
7
Comparison between reverse and traditional screening algorithms for syphilis diagnosis in Hospital Universiti Sains Malaysia
Published 2021“…Following the reverse algorithm, 27 (13.11%) cases showed discordant ECLIA and RPR results. …”
Get full text
Get full text
Thesis -
8
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…If the entropy of the destination JP address falls below the threshold and continue for five consecutive times it is declared as an attack. Then the algorithm was tested with attack on one host and a sub net of six hosts with attack rates of25%, 50% and 75% for the first case and 50%, 75% attack rate for the subnet case. …”
Get full text
Get full text
Thesis -
9
Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel
Published 2018“…The algorithm is also insensitive to the spurious background spikes that may contaminate the sEMG signal and deteriorate the performance of amplitude dependent detection methods. …”
Get full text
Get full text
Conference or Workshop Item -
10
Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation
Published 2019“…The very large number of test cases and time consumption for a test, it is becoming hard to perform exhaustive testing for any software fault detection. …”
Get full text
Get full text
Article -
11
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The results showed the effectiveness of the proposed method for detecting multiple clusters in a spatiotemporal space. …”
Get full text
Get full text
Article -
12
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…The results showed the effectiveness of the proposed method for detecting multiple clusters in a spatiotemporal space. …”
Get full text
Get full text
Article -
13
An efficient algorithm for oval shape face detection in color family photos
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
Detection of micro emboli using signal energy and discrete fourier transform / Basil Mathew Panamkuttiyil
Published 2011“…The designed algorithm was able to detect presence of emboli with considerable accuracy. …”
Get full text
Get full text
Thesis -
15
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
16
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The implementation of the K-Means Clustering algorithm for detecting the level of spread of COVID-19 data in Indonesia by using the parameter k=3 is quite good with areas in Indonesia that have a high the spread of COVID-19 and the results of the cluster validity test get silhouette values on O = (Total Case, Total Death) and P = (Total Case, Total Death, Total Recovered) have the same cluster value, which is 0.93 which means the cluster quality is very good.…”
Get full text
Get full text
Book Section -
17
Early detection of dengue disease using extreme learning machine
Published 2018“…Therefore, the proposed ELM model can be considered as an alternative algorithm to apply for early detection of Dengue disease.…”
Get full text
Get full text
Article -
18
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
19
Test case minimization applying firefly algorithm
Published 2018“…The proposed test case minimization method has the following steps: provide weight to the paths, calculate path coverage for each path, transform an immediate graph into an adjacency matrix, which later is used to apply firefly algorithm and generate optimal test cases. …”
Get full text
Get full text
Get full text
Article -
20
