Search Results - (( features detection method algorithm ) OR ( parameter estimation based algorithm ))
Search alternatives:
- features detection »
- method algorithm »
- estimation based »
- parameter »
-
1
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
3
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…Facial feature detection must first be performed before any of the face recognition methods can be applied. …”
Get full text
Get full text
Thesis -
5
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
6
Signal quality measures for pulse oximetry through waveform morphology analysis
Published 2011“…Furthermore, a heart rate estimate, extracted from uncontaminated sections of PPG, as identified by the algorithm, was compared with the heart rate derived from an uncontaminated simultaneous ECG signal. …”
Get full text
Get full text
Get full text
Article -
7
Processing and classification of landsat and sentinel images for oil palm plantation detection
Published 2022“…It first focuses on the correction algorithm needed to estimate the true surface reflectance value of the satellite image data before the image is filtered to reduce any noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
Get full text
Get full text
Get full text
Thesis -
9
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
10
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
11
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…A computationally simple two-step iterative algorithm, called estimationapproximation algorithm, is introduced for estimating the parameters of the model on the basis of the rank estimators. …”
Get full text
Get full text
Get full text
Thesis -
12
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
13
-
14
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
15
Finite impulse response optimizers for solving optimization problems
Published 2019“…In this work, three new estimation-based metaheuristic algorithms are introduced. …”
Get full text
Get full text
Thesis -
16
An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems
Published 2019“…Methods: This paper proposes an improved scatter search algorithm to address the challenging parameter estimation problem. …”
Get full text
Get full text
Get full text
Article -
17
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
18
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…The main idea is the integration of optimal control and parameter estimation. In this work, a simplified model-based optimal control model with adjustable parameters is constructed. …”
Get full text
Get full text
Thesis -
19
An Improved Scatter Search Algorithm for Parameter Estimation in Large-Scale Kinetic Models of Biochemical Systems
Published 2019“…Methods: This paper proposes an improved scatter search algorithm to address the challenging parameter estimation problem. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
