Search Results - (( data detection method algorithm ) OR ( using solution using algorithm ))
Search alternatives:
- method algorithm »
- using algorithm »
- data detection »
- using solution »
- solution using »
-
1
A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method
Published 2018“…Therefore, to overcome the several problems associated with the object detection method, a new approach in Particle Swarm Optimization (PSO) algorithm for optimal search solution as an alternative method to detect of object tracking quickly, precisely and accurately. …”
Get full text
Get full text
Get full text
Article -
2
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…By using ultrasonic methods, the obtained PD data is conventionally identified using Neural Network (NN) models where it has several disadvantages. …”
Get full text
Get full text
Thesis -
3
Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms
Published 2005“…A remarkable result can be achieved by filtering these far outliers using automatic detection mode. This paper elaborates the techniques used for the detection and elimination of the far outliers in the MBES dataset, known as robust detection algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
Get full text
Get full text
Get full text
Thesis -
5
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
6
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
7
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
8
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. However, the performance of such methods is based on the algorithms or technique. …”
Get full text
Get full text
Get full text
Article -
9
Automated threshold detection for object segmentation in colour image
Published 2016“…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…Although there are many methods of ensuring network security in IoT, such as using encryption, firewalls, and intrusion detection systems, the issue of security is still not been fully solved. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Using a novel firewall framework designed in this dissertation, an algorithm adapted from research by Yan, Wu, Luo, & Zhang (2013) was used for the P2P identification method. …”
Get full text
Get full text
Thesis -
12
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
13
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…By using ultrasonic methods, the obtained PD data is conventionally identified using Neural Network (NN) models where it has several disadvantages. …”
Get full text
Get full text
Book Section -
14
-
15
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…The result obtained from QRS complex method is used to display a healthy or unhealthy patient's condition. …”
Get full text
Get full text
Conference or Workshop Item -
16
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
17
Oil spill detection and characterization from satellite image using artificial neural network algorithm
Published 2014“…This result gives important solution for environmental handling of the oil exploitation activity. …”
Get full text
Get full text
Conference or Workshop Item -
18
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. Backpropagation is used as the learning method of ANN model. …”
Get full text
Get full text
Thesis -
19
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. Backpropagation is used as the learning method of ANN model. …”
Get full text
Get full text
Article -
20
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article
