Search Results - (( developing function method algorithm ) OR ( data detection based algorithm ))
Search alternatives:
- developing function »
- method algorithm »
- function method »
- detection based »
- data detection »
-
1
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
Get full text
Get full text
Get full text
Article -
2
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…In the proposed search-based test data generator, a whole constraints analyzer and a fitness function that evolves itself based on the error feedback were proposed. …”
Get full text
Get full text
Get full text
Thesis -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Results indicate that the wavelet-based damage detection method precisely identified the location and severity of damages even without reference data. …”
Get full text
Get full text
Get full text
Thesis -
5
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…For that, the present research has developed an RFID network-planning model that can improve real-time information detection based on the temperature and vibration in the gear and motor of the train bogies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Get full text
Article -
7
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Article -
8
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
9
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
10
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
11
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
12
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
13
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…First, the grid mapping of the robot's workspace environment is constructed, and then the borders of the workspace environment are detected based on the new proposed function. This function guides the robot to move toward the desired goal. …”
Get full text
Thesis -
14
-
15
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
19
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
20
EEG-based fatigue detection using binary pattern analysis and KNN algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
