Search Results - (( java segmentation using algorithm ) OR ( does deviation detection algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…Anomaly detection, sometimes referred to as outlier analysis is a data mining procedure that detects events, data points, and observations that deviates from the expected behaviour of a dataset. …”
    Get full text
    Get full text
    Article
  4. 4

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  5. 5

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  6. 6
  7. 7

    Computer vision automation system for sorting partially overlapping tiles by Hussin, Neam Tariq

    Published 2019
    “…A texture feature extraction algorithm based on (standard deviation of intensities and entropy) were developed and compared in the third component to identify overturned tiles from white tiles. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…To rectify this problem, we propose a Dynamic Robust Bootstrap-LTS based (DRBLTS) algorithm where the percentage of outliers in each bootstrap sample is detected. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Gait pattern detection for amputated prosthetic using fuzzy algorithm by Abdullah, Ahmad Faisal

    Published 2015
    “…The work included in this project focuses on developing a system to measure the angular displacement of human joint of lower part with patients having this problem and then applying gait phase detection using intelligent algorithm. The developed prototype has three inertial measurement units (IMU) sensor to measure and quantify body gait on thigh, shank and foot. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment by Jianhong, Mei

    Published 2019
    “…To evaluate the performance of the proposed method, the average and variance error deviation are calculated. The Euclidean distances of detected lines from ground truth are used to compare the accuracy of the proposed method. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Single-trial visual evoked potential extraction using partial least-squares-based approach by Yanti, D.K., Yusoff, M.Z., Asirvadam, V.S.

    Published 2016
    “…In P100, the PLS was comparable with the GEVD although N135 was better estimated by GEVD. The proposed PLS algorithm is comparable to GEVD given that PLS does not alter the EEG input signal. …”
    Get full text
    Get full text
    Article
  12. 12

    Single-trial visual evoked potential extraction using partial least-squares-based approach by Yanti, D.K., Yusoff, M.Z., Asirvadam, V.S.

    Published 2016
    “…In P100, the PLS was comparable with the GEVD although N135 was better estimated by GEVD. The proposed PLS algorithm is comparable to GEVD given that PLS does not alter the EEG input signal. …”
    Get full text
    Get full text
    Article
  13. 13

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…The accuracy value shows that the KNN algorithm is better when compared to the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Improving the synthetic coefficient of variation chart by incorporating side sensitivity by Lee, PingYin

    Published 2024
    “…However, due to inconsistencies in the mean and/or standard deviation of some processes, traditional control charts monitoring the mean or standard deviation become inappropriate in such situations. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing CI engine performance and emission control using a hybrid RSM–Rao algorithm for ZnO-doped castor–neem biodiesel blends by Zhu, Chao-zhe, Samuel, Olusegun D., Patel G C, Manjunath, Der, Oguzhan, Abbas, Mohamed, Hussain, Fayaz, Ting, Tin Tin

    Published 2025
    “…The former algorithm possesses the aforementioned features. Rao's algorithm does not mimic the behaviour of swarms, animals, birds, or any physical or chemical phenomenon, but it provides effective solutions to complicated problems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…The palm vascular detection processing was also executed on the self-developed dataset constructed earlier for validation. …”
    Get full text
    Get full text
    Thesis