Search Results - (( using adaptive method algorithm ) OR ( basic detection method algorithm ))
Search alternatives:
- method algorithm »
- basic detection »
-
1
Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms
Published 2012“…The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
Get full text
Get full text
Get full text
Article -
2
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Based on previous researches, most existing segmentation methods focused on a specific environment. Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
Get full text
Get full text
Thesis -
3
Multiview face emotion recognition using geometrical and texture features
Published 2017“…This enables us to determine the emotion in real-time from the face of a person. Basically, the contributions are that the method is capable of detecting the face and facial landmarks in the live video; the landmark detection on the face is done automatically in each frame using both texture of facial points and relative positions of points on the face. …”
Get full text
Get full text
Get full text
Thesis -
4
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
5
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
7
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…There are many methods to perform adaptive beamforming and one of the method is to use metaheuristic algorithm, to estimate the weights for individual elements in an array. …”
Get full text
Get full text
Thesis -
8
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
10
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
11
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
12
Simultaneous Adaptation Of Multiple Genetic Algorithm Parameters Using Fuzzy Logic Controllers
Published 2010“…This study aims at designing an online adaptive method to control multiple parameters of the Genetic Algorithm. …”
Get full text
Get full text
Thesis -
13
Adaptive route optimization for mobile robot navigation using evolutionary algorithm
Published 2021“…Classical methods like artificial potential field, grid search, and visual method have been easily overtaken by artificial intelligence due to its adaptability and ability to learn from the past mistakes or experience. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
14
Position control of robot manipulator: Design a novel SISO adaptive sliding mode fuzzy PD fuzzy sliding mode control.
Published 2011“…This algorithm will be analyzed and evaluated on robotic manipulators and design adaption laws of adaptive algorithms after that writing Lyapunov function candidates and prove the asymptotic convergence of the closed-loop system using Lyapunov stability theorem mathematically. …”
Get full text
Get full text
Article -
15
Comparison on performance of adaptive algorithms for eye blinks removal in electroencephalogram
Published 2018“…One of the methods that can be applied for automatic artifacts removal is adaptive filtering through an adaptive noise cancellation (ANC) system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…The adaptation method of the LMS, NLMS and RLS algorithms quantizes the noise input signal during a limited period to track the error sample by sample. …”
Get full text
Get full text
Thesis -
17
Robust and adaptive control with application to mechanical systems
Published 2009Get full text
Working Paper -
18
Adaptive firefly algorithm for hierarchical text clustering
Published 2016“…In this research, an adaptive hierarchical text clustering algorithm is proposed based on Firefly Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
20
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers
