Search Results - (( using computing using algorithm ) OR ( software identification method algorithm ))
Search alternatives:
- software identification »
- identification method »
- method algorithm »
- using computing »
- using algorithm »
-
1
-
2
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…Genetic algorithm (GA) as a popular search method, is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Using a novel algorithm in ultrasound images to detect renal stones
Published 2021“…Expectation–Maximization algorithm is a novel method used by us for the first time for identifying renal stones. …”
Get full text
Get full text
Get full text
Proceedings -
4
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…This was carried out using a computational software on a number of simulated data. …”
Get full text
Get full text
Get full text
Article -
5
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
6
Autoreclosure in Extra High Voltage Lines using Taguchi's Method and Optimized Neural Networks
Published 2009“…The fault identification prior to reclosing is based on optimized artificial neural network associated with standard Error Back-Propagation, Levenberg Marquardt Algorithm and Resilient Back-Propagation training algorithms together with Taguchi’s Method. …”
Get full text
Get full text
Conference or Workshop Item -
7
Cabbage disease detection system using k-NN algorithm
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
8
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…It was a combined algorithm of Weighted Product Method (WPM) and Dijkstra’s Algorithm. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Fingerprint recognition system
Published 2005Get full text
Get full text
Undergraduates Project Papers -
11
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Embedded system for biometric identification based on iris detection
Published 2009Get full text
Article -
13
-
14
Automated QT interval measurement using modified Pan-Tompkins algorithm with independent isoelectric line approach
Published 2020“…This method uses an improved Pan-Tompkins algorithm from the previous work with independent of the isoelectric line approach for detecting the QRS onset and the T offset. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Topic identification method for textual document
Published 2017Get full text
Get full text
Get full text
Article -
16
-
17
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Malware is one of the most harmful forms of attack on computers because of its passive approach and hidden execution. …”
Get full text
Get full text
Student Project -
18
-
19
Development of thumbprint recognition system using Matlab / Wan Hasnizam Wan Hassan
“…Biometric is a technology, which identifies a person based on his physiology or behavioral characteristics. Thumbprint identification and recognition is one of the biometrics method available that has been widely used in various applications because of it is reliability and accuracy in the process of recognizing and verifying a person identity. …”
Get full text
Get full text
Student Project -
20
