Search Results - (( parameter implementation using algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- parameter implementation »
- implementation using »
- parameter detection »
- method algorithm »
- using algorithm »
-
1
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
Get full text
Get full text
Conference or Workshop Item -
3
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
4
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
5
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…Employing Otsu's method and Canny edge detection, the algorithm seeks to accurately identify and contour the edges of potholes in urban road imagery. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
7
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
Get full text
Get full text
Thesis -
8
Voltage Variation Analysis By Using Gabor Transform
Published 2019“…The voltage variation signals are successfully detected by using the K-Nearest Neighbors (kNN) algorithm with the implementation of signal parameters extracted as the input on the classifier. …”
Get full text
Get full text
Get full text
Article -
9
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
10
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…The information gathered is useful for Authorities, concession expressway company and interest party for better road maintenance implementation.…”
Get full text
Get full text
Thesis -
11
Autism Spectrum Disorder Classification Using Deep Learning
Published 2021“…The image data is pre-processed; the CNN algorithm is then applied to classify the ASD and non-ASD, and the steps of implementing the CNN algorithm are clearly stated. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The implementation of the K-Means Clustering algorithm for detecting the level of spread of COVID-19 data in Indonesia by using the parameter k=3 is quite good with areas in Indonesia that have a high the spread of COVID-19 and the results of the cluster validity test get silhouette values on O = (Total Case, Total Death) and P = (Total Case, Total Death, Total Recovered) have the same cluster value, which is 0.93 which means the cluster quality is very good.…”
Get full text
Get full text
Book Section -
13
-
14
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod
Published 2010“…This method provides magnificent speed up over than traditional sequential implementation methods while it sensitivity detection is still remained. …”
Get full text
Get full text
Thesis -
15
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…Hence, the main objective of this research is to address the feasibility and demonstrate the potential of DM in SHM, as well as apply DM technology which includes machine learning, artificial intelligence and statistical methods for damage detection of a lab-scale slab-on-girder bridge and four steel I beams structures using dynamic parameters of structures. …”
Get full text
Get full text
Get full text
Thesis -
17
Numerical Analysis of structural batteries response with the presence of uncertainty
Published 2023“…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Article -
18
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…Therefore, two automated procedures are developed to determine these parameters iteratively. The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
19
Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation
Published 2021“…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
Get full text
Get full text
Article -
20
Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty
Published 2023“…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Get full text
Article
