Search Results - (( developing function using algorithm ) OR ( data detection method algorithm ))
Search alternatives:
- developing function »
- method algorithm »
- using algorithm »
- data detection »
-
1
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The fuzzy-ID3 algorithm with association function implementation (FID3-AF) is proposed as a classification technique for breast cancer detection. …”
Get full text
Get full text
Get full text
Article -
2
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…The whole constraint analyzer and the fitness function were combined with four SBTs (genetic algorithm, evolutionary algorithm, simulating annealing, and quantum genetic algorithm). …”
Get full text
Get full text
Get full text
Thesis -
4
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…It was achieved by developing automated software to generate the new Data Background sequence and rearrange the existing March algorithms’ test operations to remove redundancies and enable the sensitization and detection of the intended faults while preserving their complexities. …”
Get full text
Get full text
Get full text
Article -
5
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis -
6
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…However, most of existing damage detection methods requires reference data which are not always available. …”
Get full text
Get full text
Get full text
Thesis -
7
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
8
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…The SVM algorithm has been used to detect high- and low-density vegetation regions from the extracted ROI. …”
text::Thesis -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
Get full text
Get full text
Article -
12
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
Get full text
Get full text
Get full text
Article -
13
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
14
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
15
Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain
Published 2020“…The system that are proposed will used image as the input. The evaluation of the classifier that are developed are done by accuracy test and the system are evaluated by functionality test. …”
Get full text
Get full text
Thesis -
16
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
17
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
18
Terahertz sensing analysis for early detection of ganoderma boninense disease using near infrared (NIR) spectrometer
Published 2023“…The non-destructive method using NIRS with ML and predictive analytics has the potential to be a highly sensitive and reliable method for the early detection of G. boninense. …”
Get full text
Get full text
Thesis -
19
Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model
Published 2023“…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Hydraulic characterization of PVC-O pipes by means of transient tests
Published 2019“…The data analysis of the signal that then to be decomposed into a series of wave composition with the use of EEMD signal masking method by using the matrix laboratory (MATLAB) software. …”
Get full text
Get full text
Research Report
