Search Results - (( developing confirmation detection algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- developing confirmation »
- java implication »
- implication tree »
- tree algorithm »
-
1
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant
Published 2008“…The recent work presents a new method of fault diagnosis based on artificial neural networks and genetic algorithms. The networking is under development to resolve this problem. …”
Get full text
Get full text
Conference or Workshop Item -
3
Predicting pneumonia and region detection from X-Ray images using deep neural network
Published 2021“…The model has achieved an accuracy of 90.6 percent which confirms that the model is effective and can be implemented for the detection of Pneumonia in patients. …”
Get full text
Get full text
Get full text
Article -
4
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
5
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
Get full text
Get full text
Thesis -
6
Development of mesoscopic imaging system for surface inspection / Moe Win
Published 2018“…The results obtained are compared with those obtained from optical microscopy to verify the accuracy of detection. For the automatic inspection, defect detection algorithms based on image thresholding are developed and implemented as a statistical approach to identify possible defects. …”
Get full text
Get full text
Get full text
Thesis -
7
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The results from the algorithm are confirmed with an analysis of the signals using Fast Fourier Transforms.…”
Get full text
Get full text
Get full text
Article -
8
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems (IDS). …”
Get full text
Get full text
Get full text
Article -
9
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The results from the algorithm are confirmed with an analysis of the signals using fast Fourier transforms.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Feasibility study of utilising electronic nose to detect BSR disease in oil palm plantation
Published 2010“…As a conclusion, this work confirms that it is feasible to utilise the electronic nose and ANNs to detect and discriminate the BSR disease both in the laboratory and in the plantation.…”
Get full text
Thesis -
12
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
13
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
Get full text
Get full text
Article -
14
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…The comparison results confirm the superiority of the proposed algorithm in computation time with improvement of over 38%.…”
Get full text
Get full text
Get full text
Article -
15
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
16
Development of shape pattern recognition for fpga-based embbeded object tracking system
Published 2010Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Cassification of breast tumor based on ultrasound images
Published 2009“…Next, the filtered images are run through a set of edge detection algorithms which identifies and defines the region of interest. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Translating conventional wisdom on chicken comb color into automated monitoring of disease-infected chicken using chromaticity-based machine learning models
Published 2024“…Bacteria- or virus-infected chicken is conventionally detected by manual observation and confirmed by a laboratory test, which may lead to late detection, significant economic loss, and threaten human health. …”
Article -
19
Spear- phishing attack detection using artificial intelligence
Published 2024“…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Foreign object detection based on circular bistatic synthetic aperture radar
Published 2013“…A processing algorithm is proposed in this paper to confirm the detection. …”
Get full text
Get full text
Get full text
Article
