Search Results - (( java implication based algorithm ) OR ( third detection using algorithm ))
Search alternatives:
- implication based »
- java implication »
- third detection »
- using algorithm »
-
1
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Modified Binary Grey Wolf Optimiser (MBGWO) is a modern metaheuristic algorithm that has successfully been used for FS for anomaly detection. …”
Get full text
Get full text
Thesis -
2
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. …”
Short Survey -
4
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Furthermore, two widely feature detection algorithms, which is Harris Corner Detector and FAST Corner Detector are used to compare in terms of the amount of corner point detection and run time of processing. …”
Get full text
Get full text
Thesis -
5
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. …”
Get full text
Get full text
Article -
7
Overhead view based person counting using deep learning
Published 2022“…Second, the OpenVINO Inference Engine is utilized to optimize the trained models in order to facilitate real-time implementation. Third, the accurate tracking of each detected person is performed using the deep learning based tracking framework, known as DeepSORT. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Broken Conductor Detection on Power Distribution Feeder
Published 2013“…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
Get full text
Get full text
Get full text
Article -
9
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…The purpose of this research is to detect the rust in oil tanks by localizing visual inspection technology using UAVs, as well as to develop algorithms to distinguish between defects and noise. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
Get full text
Get full text
Thesis -
11
-
12
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
13
Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model
Published 2013“…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
Get full text
Get full text
Get full text
Article -
14
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
15
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…The combination of Genetic Algorithm, Immune Algorithm and local search has produced good detection with acuracy rate of 98.91% and has the potential to be further investigated for other research areas.…”
Get full text
Get full text
Get full text
Article -
16
Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga
Published 2022“…Colorectal cancer is the third most deadly cancer worldwide. The use of gut microbiome in early detection of the disease has attracted much attention from the research community due to its non-invasive nature. …”
Get full text
Get full text
Get full text
Thesis -
17
Vertical-edge-based car-license-plate detection method
Published 2013“…Then, the candidate region based on statistical and logical operations will be extracted. Finally, an LP is detected. The third contribution is that we compare the VEDA to the Sobel operator in terms of accuracy, algorithm complexity, and processing time. …”
Get full text
Get full text
Get full text
Article -
18
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
19
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
20
Optimizing high-density aquaculture rotifer Detection using deep learning algorithm
Published 2022“…Second, is to develop the deep learning algorithm based on YOLOv3. Third step is to training and evaluate the model using loss function. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
