Search Results - (( java implication tree algorithm ) OR ( self detection method algorithm ))
Search alternatives:
- java implication »
- implication tree »
- method algorithm »
- tree algorithm »
- self detection »
-
1
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Article -
2
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Get full text
Article -
3
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
4
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…For both indoor and outdoor scene, the proposed algorithm outperforms the other methods with accuracy 97% and 100%. …”
Get full text
Get full text
Thesis -
6
A lower complexity K best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Article -
7
A lower complexity k best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
9
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
10
Improved self-organizing map clustering of power transformer dissolved gas analysis using inputs pre-processing
Published 2023“…Clustering algorithms; Conformal mapping; Data visualization; Power transformers; Self organizing maps; Support vector machines; Data normalization methods; Detection sensitivity; Dissolved gas analyses (DGA); Dissolved gas analysis; High dimensional data; Incipient fault detection; Interpretation methods; Topological relations; Fault detection…”
Article -
11
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Memory testing is a method that requires an algorithm capable of detecting faulty memory as comprehensively as possible to facilitate the efficient manufacture of fault free memory products. …”
Get full text
Get full text
Thesis -
12
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
13
Testing static single cell faults using static and dynamic data background
Published 2011“…Both static and dynamic DB transitions are used in order to detect Deceptive Read Destructive Faults (DRDFs) and Write Disturb Faults (WDFs) that are not detected by previous algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment
Published 2017“…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
Get full text
Get full text
Thesis -
15
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The fine-grained cloud detection and recognition (FGCDR) algorithm is use to extract colour, inside texture and neighbour texture features from multiview of superpixels sky images. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Self routing traffic light for traffic light controller using priority method based on volume of vehicles
Published 2015“…In order to increase and enhance the efficiency and accuracy of real time traffic flow, this thesis proposes a novel implementation of sensing method called Self-Routing Traffic Light (SRTL) which incorporates a self-algorithm program as a practical solution to reduce traffic congestion. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A hyperbola-pair based lane detection system for vehicle guidance
Published 2010“…The proposed lane detection algorithm can be applied on both painted and unpainted road as well as curved and straight road. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation
Published 2021“…The conventional methods of observer poles placement in sensor fault detection usually adopt the trial-and-error methods. …”
Get full text
Get full text
Article -
20
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…In this paper, we explore the potential of our algorithm on two self-collected, and DEAP databases. …”
Get full text
Get full text
Article
