Search Results - (( using combination using algorithm ) OR ( using normalization based algorithm ))
Search alternatives:
- normalization based »
- combination using »
- using algorithm »
-
1
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
2
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper -
3
Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz
Published 2013“…Therefore, we proposed a shape recognition algorithm using similarity measurement combining Jaccard and Mahalanobis distance is used to measure the similarity between geometry shape sketches. …”
Get full text
Get full text
Thesis -
4
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
5
DTWFF-pitch feature and faster neural network convergence for speech recognition
Published 2007“…The processed features are pitch and Linear Predictive Coefficients (LPC) for input and reference templates, based on Dynamic Time Warping (DTW) algorithm. The first task is to extract pitch features using Pitch Scale Harmonic Filter algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
Get full text
Get full text
Monograph -
7
Artificial neural network-salp-swarm algorithm for stock price prediction
Published 2024“…Before training, the dataset is normalized using the min-max normalization technique to reduce the influence of noise. …”
Get full text
Get full text
Get full text
Article -
8
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The methodology is to use the maximize margin of SVM algorithm to alert for the presence of attack, and the proposed flexible packet filtering, which is a combination of both static and dynamic packet filtering was the method that has been followed to filter network traffics based on anomaly behavior. …”
Get full text
Get full text
Get full text
Thesis -
9
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…There are different techniques used in RS. Some works are based on user past knowledge known as Content Based (CB) while more popular techniques referred to as neighborhood models (CF and MF) are based on finding similar users for recommendation. …”
Get full text
Get full text
Thesis -
10
Feature fusion using a modified genetic algorithm for face and signature recognition system
Published 2015“…To overcome the issue of incompatible features to be combined, Wrapper Genetic Algorithm (GA) was implemented as the feature selection algorithm due to its ability to evaluate the features irrespective of which domain by masking the features with bit number. …”
Get full text
Get full text
Thesis -
11
Detection of acute leukaemia cells using variety of features and neural networks
Published 2011Get full text
Working Paper -
12
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. …”
Get full text
Thesis -
13
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…However, present complex algorithms which are accurate require high processing power using a large size of learning dataset without labelling error. …”
Get full text
Get full text
Thesis -
14
Stereo matching algorithm based on hybrid convolutional neural network and directional intensity difference
Published 2021“…It is also competitive with other published methods and can be used as a complete algorithm.…”
Get full text
Get full text
Get full text
Article -
15
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…Finally, the combined control algorithm was implemented using a DSpace 1104 environment and extensively tested under various partially shaded patterns. …”
Get full text
Get full text
Article -
16
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The Differential Evolution Algorithm (DE) is used in this work to select the optimum color and texture information to achieve the optimum response. …”
Get full text
Get full text
Thesis -
17
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
20
Efficient document retrieval system using locality sensitive hashing nearest neighbor algorithm and weighted jaccard distance for retrieving closest personalities
Published 2024“…The proposed method utilizes the Locality Sensitive Hashing Nearest Neighbor algorithm combined with Weighted Jaccard Distance to measure document similarity with enhanced precision. …”
Get full text
Get full text
Get full text
Article
