Search Results - (( feature detection method algorithm ) OR ( parameter simulation based algorithm ))
Search alternatives:
- parameter simulation »
- feature detection »
- method algorithm »
- simulation based »
-
1
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…Facial feature detection must first be performed before any of the face recognition methods can be applied. …”
Get full text
Get full text
Thesis -
2
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…The algorithm also utilizes certain statistical features from the EEG signal that are used as features to the classifier logic. …”
Get full text
Get full text
Conference or Workshop Item -
3
Power quality problem classification based on Wavelet Transform and a Rule-Based method
Published 2010“…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
Get full text
Get full text
Conference or Workshop Item -
4
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
5
Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method
Published 2010“…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
Get full text
Get full text
Conference or Workshop Item -
6
Power Quality Problem Classification Based on Wavelet Transform and a Rule-Based method
Published 2010“…These features and together with the duration of disturbance of occurrence obtained from 1st level of detail, they form the criteria for a Rule-Based software algorithm for detecting different kinds of power quality disturbances effectively. …”
Get full text
Get full text
Conference or Workshop Item -
7
Embedded Fuzzy Classifier for Detection and Classification of Preseizure State Using Real EEG Data
Published 2013“…The algorithm also utilizes certain statistical features from the EEG signal that are used as features to the classifier logic. …”
Get full text
Get full text
Get full text
Book Section -
8
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…The disturbances waveforms obtained from the simulation axe decomposed by wavelet packet transform and used to extract the distinctive features of the voltage signals. …”
Get full text
Get full text
Thesis -
9
A novel islanding detection technique using modified Slantlet transform in multi-distributed generation
Published 2019“…Slantlet transform is utilized to derive the features in the required detection parameters measured from islanding and non-islanding events using identified Slantlet scales. …”
Get full text
Get full text
Get full text
Article -
10
High impedance fault detection and localization in 11kV distribution system / Mohd Syukri Ali
Published 2018“…Subsequent algorithm simulation results show that the proposed methods are able to detect and subsequently locate the faults with high accuracies. …”
Get full text
Get full text
Get full text
Thesis -
11
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
12
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
13
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
14
-
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
16
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
18
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
20
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article
