Search Results - (( initial detection using algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- initial detection »
- java implication »
- using algorithm »
-
1
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
Get full text
Get full text
Conference or Workshop Item -
4
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…FPDI uses simple probe and oscilloscope for detection while the competitors are using the PD circuit detector. …”
Get full text
Get full text
Thesis -
5
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…After classifying the time set using the canopy with the K-means algorithm and the vector representation weighted by factors, the clustering impact is assessed using purity, precision, recall, and F value. …”
Article -
6
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
7
Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff
Published 2007“…Genetic algorithms have several steps. For the initial population, 200 pixels will be taken to be the initial population in randomly. …”
Get full text
Get full text
Thesis -
8
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…FPSO incorporates fuzzy edge detection technique as the initial population and the optimum membership value as the fitness function in the particle swarm optimization algorithm. …”
Get full text
Get full text
Thesis -
9
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Hence, we propose a framework to detect ambiguity on SRS using supervised machine learning technique. …”
Get full text
Get full text
Get full text
Thesis -
10
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In addition, the wipe and dissolve transitions are detected using the change-point detection technique, SVM model, and scale invariant feature transform (SIFT). …”
Get full text
Get full text
Get full text
Thesis -
12
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
Get full text
Get full text
Thesis -
13
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…Machine learning approaches have been widely used to increase the effectiveness of intrusion detection platforms. …”
Get full text
Get full text
Thesis -
15
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
16
Development of vehicle detection and counting system for traffic analysis using computer vision
Published 2024“…Once the trained weights are ready a deep learning algorithm detection model is applied to detect and draw a bounding box on the vehicles. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Using a novel algorithm in ultrasound images to detect renal stones
Published 2021“…Expectation–Maximization algorithm is a novel method used by us for the first time for identifying renal stones. …”
Get full text
Get full text
Get full text
Proceedings -
18
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Development of an efficient algorithm for fetal heart rate detection: a hardware approach
Published 2006“…The algorithm was initially developed and simulated in Visual C++. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…We look at several issues encountered when calculating the maximum likelihood estimates of the Gaussian mixed model using an Expectation Maximization algorithm. Firstly, we look at a mechanism for the determination of the initial number of Gaussian components and the choice of the initial values of the algorithm using the kernel method. …”
Get full text
Get full text
Get full text
Article
