Search Results - (( initial detection technique algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Detection And Segmentation Of Mass Region In Mammogram Image by Ting, Shyue Siong

    Published 2014
    “…Unfortunately, none of the proposed techniques provide good results in both mass detection and segmentation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Hence, we propose a framework to detect ambiguity on SRS using supervised machine learning technique. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…The Canopy clustering approach, enabled by distributed machine learning through Apache Mahout, is utilized as a preprocessing step within the K-means clustering technique. The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
    Article
  6. 6
  7. 7

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…In addition, the wipe and dissolve transitions are detected using the change-point detection technique, SVM model, and scale invariant feature transform (SIFT). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    PCB defect detection system using run-length encoding by Zakaria, Muhammad Anif

    Published 2017
    “…The outcomes by using this technique is it can classify and detect the defect of the PCB. …”
    Get full text
    Get full text
    Student Project
  9. 9
  10. 10

    Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid. by Abdul Khalid, Noor Elaiza

    Published 2010
    “…FPSO incorporates fuzzy edge detection technique as the initial population and the optimum membership value as the fitness function in the particle swarm optimization algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Using a novel algorithm in ultrasound images to detect renal stones by Sania Eskandari, Saeed Meshgini, Ali Farzamnia

    Published 2021
    “…Medical ultrasound is utilized as the primary method for the detection of kidney stones. Ultrasound imaging is often more popular than other imaging techniques because it is portable, low-cost, non-invasive, and does not utilize ionizing radiations. …”
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13
  14. 14

    Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of vehicle detection and counting system for traffic analysis using computer vision by Saw, Kenny Wei Wen

    Published 2024
    “…Once the trained weights are ready a deep learning algorithm detection model is applied to detect and draw a bounding box on the vehicles. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Machine Learning Approaches to Advanced Outlier Detection in Psychological Datasets by Abri K.Al., Sidhu M.S.

    Published 2025
    “…In conclusion, while individual algorithms provide distinct perspectives, ensemble techniques enhance the accuracy and consistency of outlier detection. …”
    Article
  18. 18

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…One of the main challenges of MPPT techniques under PSCs is ability of the algorithms to find the GMPP faster with minimal oscillation in power. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  20. 20