Search Results - (( evolution computing techniques ) OR ( deviation detection techniques ))
Search alternatives:
- computing techniques »
- detection techniques »
- deviation detection »
- evolution »
-
1
Metric-based code smell detection technique for python software
Published 2018“…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
Get full text
Get full text
Thesis -
2
Inventory record analysis using deviation analysis / Muda Wali Abdullah
Published 2015“…This project is about the analysis of inventory records based on data mining technique which is deviation analysis. Deviation analysis refers to the identifying of anomalies which are different things from normal. …”
Get full text
Get full text
Thesis -
3
-
4
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…For each proposed soft computing technique, parameter tuning is done as an essential study. …”
Get full text
Get full text
Thesis -
5
Development of a computer vision-based technique for analysis of hand therapy exercise
Published 2018“…For this purpose, the ROM exercise was developed by using the hand detection and tracking, fingertips detection, skeleton joints detection algorithms and joint angle measurement algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Differential evolution technique of HEPWM for three-phase voltage source inverter
Published 2016“…This paper presents the execution of Differential Evolution (DE) algorithm in order to understand the principle operation of Harmonic Elimination Pulse-Width Modulation (HEPWM) switching technique. …”
Get full text
Get full text
Get full text
Article -
7
Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter
Published 2018“…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Speed estimation and target detection in forward scattering radar
Published 2008“…This paper presents work on target detection and speed estimation method in one of radar types called Forward Scattering Radar (FSR). …”
Get full text
Get full text
Conference or Workshop Item -
9
Sleep apnea detection using cardioid based grap
Published 2016“…Thus, the output of the study suggests the proof-of-concept of our proposed mechanisms to detect heart abnormalities and has the potential to act as an alternative to the current techniques.…”
Get full text
Get full text
Get full text
Article -
10
Cumulative frame differencing for urban vehicle detection
Published 2024“…The tests of the proposed technique achieve robust and accurate vehicle segmentation, which improves detection of slow motion, temporary and long term stopped vehicles, moreover, it enables the real-time capability.…”
Proceedings Paper -
11
Modeling 2D appearance evolution for 3D object categorization
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Image Copy-Move Forgery Detection Algorithms Based on Spatial Feature Domain
Published 2023Conference Paper -
13
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…The system was founded to be able to detect faults and promptly diagnose them.…”
Get full text
Get full text
Article -
14
New Variable Sampling Interval Run Sum Standard Deviation And Run Sum Multivariate Coefficient Of Variation Charts
Published 2017“…In Statistical Process Control (SPC), the control charting technique is an effective method to solve quality issues in manufacturing and service industries. …”
Get full text
Get full text
Thesis -
15
Network anomaly detection approach based on frequent pattern mining technique
Published 2014Get full text
Get full text
Conference or Workshop Item -
16
HEAT EXCHANGER NETWORK SYNTHESIS AND OPTIMIZATION BY PINCH ANALYSIS AND DIFFERENTIAL EVOLUTION METHOD
Published 2016“…This metadology way uses an algorithm which combines Pinch Design Method and Differential Evolution Method. In this technique, the Heat Exchanger Network synthesis is carried out in three levels. …”
Get full text
Get full text
Thesis -
17
Modified Statistical Process Control For Short Runs Test And Measurement Process To Reduce False Alarm
Published 2018“…Thereafter, Five-band setting and S–factor are proposed to estimate process standard deviation to maximize the the opportunity to detect assignable causes with low false-reject rate. …”
Get full text
Get full text
Thesis -
18
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These systems find the behavior that is deviated from the normal behavior. Network anomaly detection methods are implemented using different approaches including machine learning, data mining, and many more. …”
Get full text
Get full text
Article -
19
Comparative study between signature-based and anomaly-based network intrusion detection system (SBNIDS and ABNIDS)
Published 2015“…On the other hand, Anomaly-based detection techniques which is a behaviour techniques, detects the abnormal behaviour in a computer systems and networks. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Decomposition–based multi-objective differential evolution for extractive multi-document automatic text summarization
Published 2024“…However, the current approach faces a significant hurdle due to the computational intensity of the process, particularly when employing complex optimization techniques like swarm intelligence optimization alongside a costly ATS repair operator. …”
Get full text
Get full text
Article
