Search Results - (( practices detection method algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- practices detection »
- method algorithm »
-
1
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…This study presents pre-processing methods for detecting lane detection using camera and Light Detection and Ranging (LiDAR) sensor technologies. …”
Get full text
Get full text
Get full text
Article -
2
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
3
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
4
Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease
Published 2024“…Methods The Framingham Heart Study (FHS) dataset publicly available on Kaggle was used in this study. …”
Get full text
Get full text
Get full text
Article -
5
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…HBA as metahueristic algorithm is used to optimize the network training process of ANN to improve their performances. …”
Get full text
Get full text
Get full text
Article -
6
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…In addition, a simple procedure is proposed to determine the optimal solution and predict the correlation factor and the frequency of the damaged communication tower by using the particle swarm optimization (PSO) method. …”
Get full text
Get full text
Thesis -
7
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Article -
8
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks
Published 2024“…The aging infrastructure of petroleum and natural gas pipelines poses a threat to national economies, necessitating precise defect detection for safety and efficiency. To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
10
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
11
Computer Aided Slope Stability Analysis Using Optimization And Parallel Computing Techniques
Published 2013“…Firstly, the present study resolves this issue by developing a decoupled algorithm that allows for easy implementation of optimization techniques. …”
Get full text
Get full text
Thesis -
12
Inverse problem in image processing: Image restoration
Published 2023“…The proposed MB-ES algorithm utilizes intermediate restored images to identify the optimal stopping point using PSNR and SSIM metrics, thus eliminating the need for pre-defined early stopping. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Computationally enhanced UAV-based real-time pothole detection using YOLOv7-C3ECA-DSA algorithm
Published 2025“…Although YOLO-based algorithms have been widely adopted for their speed and efficiency in object detection, achieving a balance between high accuracy and low inference time remains a challenge, particularly in scenarios involving small objects and complex features. …”
Get full text
Get full text
Get full text
Article -
15
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…ESET performs text anomaly detection by employing optimized Cosine Similarity, hybridizing LSA with modified SET, and integrating it with Word Sense Disambiguation algorithms specifically Lesk and Selectional Preference. …”
Get full text
Get full text
Get full text
Thesis -
16
Mental stress classification based on selected electroencephalography channels using correlation coefficient of Hjorth parameters
Published 2023“…From our rigorous examinations, eight channels emerged as universally optimal in detecting stress variances across participants. Leveraging features from the time, frequency, and time–frequency domains of these channels, and employing machine learning algorithms, notably RLDA, SVM, and KNN, our approach achieved a remarkable accuracy of 81.56% with the SVM algorithm outperforming existing methodologies. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi
Published 2016“…As a consequence, the computational performance of structural health monitoring strategies will be directly influenced by the higher computational competency and convergence rate of the proposed wavelet-based method for structural simulation. Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
Get full text
Get full text
Thesis -
18
-
19
Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism
Published 2025“…This thesis presents an innovative approach to enhance examination fairness through automated cheating detection using an improved YOLOv8 algorithm integrated with an attention mechanism. …”
Get full text
Get full text
Get full text
Thesis -
20
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…The early design of the augmented reality application exhibits potential for real-time data visualisation, providing insights into optimal detection distances and angles. This research lays the foundation for future investigations into integrating methods for stable augmented reality applications in cooling systems. …”
Get full text
Get full text
Thesis
