Search Results - (( framework implementation using algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- framework implementation »
- implementation using »
- parameter detection »
- method algorithm »
- using algorithm »
-
1
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
2
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The classification algorithms such as the Lavenberg-Marquardt (LM), Bayesian regularization (BR), scaled conjugate gradient (SCG) and one model of bag-of-features (BoF) are used in this research. …”
Get full text
Get full text
Thesis -
3
Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory
Published 2015“…State observers are then implemented as the fault detection method in which the discrepancies between the measured values by the sensors and the values of the model are expressed as residuals. …”
Get full text
Get full text
Get full text
Thesis -
4
Nonlinear vibration based modeling for damage detection of reinforced concrete beams / Muhammad Usman Hanif
Published 2018“…The nonlinear behavior, in the form of nonlinear vibration characteristics, was used in proposing a damage detection algorithm which doesn’t rely on the baseline data of the structure. …”
Get full text
Get full text
Get full text
Thesis -
5
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
6
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
7
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
8
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
9
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
10
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
11
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The framework is used to increase the implementation performance of quantum algorithms. …”
Get full text
Get full text
Thesis -
12
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
15
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
16
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
17
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…Evaluations of four different sets of applications that used the proposed implementation frameworks with dynamic parameterization have indicated the effectiveness of each tested algorithm in comparison to the single PSO and constant parameterization. …”
Get full text
Get full text
Thesis -
18
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
20
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
Get full text
Get full text
Article
