Search Results - (( initial detection method algorithm ) OR ( using codification system algorithm ))
Search alternatives:
- codification system »
- using codification »
- initial detection »
- method algorithm »
- system algorithm »
-
1
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
Get full text
Get full text
Thesis -
2
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…Amongst the proposed community detection methods, the label propagation algorithm (LPA) emerges as an effective detection method due to its time efficiency. …”
Get full text
Get full text
Article -
3
Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images
Published 2011“…This paper presents a new method for efficient selection of initial points for exploratory tracing algorithms. …”
Get full text
Get full text
Get full text
Article -
4
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
Get full text
Get full text
Thesis -
5
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
Get full text
Get full text
Thesis -
6
Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff
Published 2007“…Genetic algorithms have several steps. For the initial population, 200 pixels will be taken to be the initial population in randomly. …”
Get full text
Get full text
Thesis -
7
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
Get full text
Get full text
Conference or Workshop Item -
8
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
Get full text
Get full text
Get full text
Article -
10
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
Get full text
Get full text
Get full text
Thesis -
11
Using a novel algorithm in ultrasound images to detect renal stones
Published 2021“…Expectation–Maximization algorithm is a novel method used by us for the first time for identifying renal stones. …”
Get full text
Get full text
Get full text
Proceedings -
12
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
Get full text
Get full text
Get full text
Article -
13
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
Get full text
Get full text
Book Section -
14
-
15
Real‑time chatter detection during turning operation using wavelet scattering network
Published 2024“…The results clearly show that the WSN featurization method with SVM algorithm can significantly reduce the complexity of the existing online chatter detection systems without compromising the accuracy.…”
Get full text
Get full text
Get full text
Article -
16
Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms
Published 2012“…The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
Get full text
Get full text
Get full text
Article -
17
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The proposed method shown an outperformed the existing classification method. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis
