Search Results - (( using adaptive method algorithm ) OR ( basic detection method algorithm ))

Refine Results
  1. 1

    Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms by Abd Manap, Nurulfajar, Soraghan, John J.

    Published 2012
    “…The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Based on previous researches, most existing segmentation methods focused on a specific environment. Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Multiview face emotion recognition using geometrical and texture features by Goodarzi, Farhad

    Published 2017
    “…This enables us to determine the emotion in real-time from the face of a person. Basically, the contributions are that the method is capable of detecting the face and facial landmarks in the live video; the landmark detection on the face is done automatically in each frame using both texture of facial points and relative positions of points on the face. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…There are many methods to perform adaptive beamforming and one of the method is to use metaheuristic algorithm, to estimate the weights for individual elements in an array. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  12. 12

    Simultaneous Adaptation Of Multiple Genetic Algorithm Parameters Using Fuzzy Logic Controllers by Ghallab, Abdullatif Saleh Nasser

    Published 2010
    “…This study aims at designing an online adaptive method to control multiple parameters of the Genetic Algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive route optimization for mobile robot navigation using evolutionary algorithm by Kit Guan Lim, Guan Lim, Yoong Hean Lee, Hean Lee, Min Keng Tan, Keng Tan, Hou, Pin Yoong, Tienlei, Wang, Tze, Kenneth Kin Teo

    Published 2021
    “…Classical methods like artificial potential field, grid search, and visual method have been easily overtaken by artificial intelligence due to its adaptability and ability to learn from the past mistakes or experience. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  14. 14

    Position control of robot manipulator: Design a novel SISO adaptive sliding mode fuzzy PD fuzzy sliding mode control. by Sulaiman, Nasri, Piltan, Farzin, Allahdadi, Sadeq, Dialame, Mohammadali, Abbas, Zulkifly

    Published 2011
    “…This algorithm will be analyzed and evaluated on robotic manipulators and design adaption laws of adaptive algorithms after that writing Lyapunov function candidates and prove the asymptotic convergence of the closed-loop system using Lyapunov stability theorem mathematically. …”
    Get full text
    Get full text
    Article
  15. 15

    Comparison on performance of adaptive algorithms for eye blinks removal in electroencephalogram by Abd Rahman, Faridah, Othman, Mohd Fauzi, Hamzah, Mohd Ilham Rusydan Hamzah

    Published 2018
    “…One of the methods that can be applied for automatic artifacts removal is adaptive filtering through an adaptive noise cancellation (ANC) system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…The adaptation method of the LMS, NLMS and RLS algorithms quantizes the noise input signal during a limited period to track the error sample by sample. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Adaptive firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim

    Published 2016
    “…In this research, an adaptive hierarchical text clustering algorithm is proposed based on Firefly Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20