Search Results - (( using detection method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- method algorithm »
- using detection »
- function method »
- using function »
-
1
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…Automatic diagnostic methods were frequently used to conduct breast cancer diagnoses in order to increase the accuracy and speed of detection. …”
Get full text
Get full text
Get full text
Article -
2
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
5
Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel
Published 2018“…The merging of these two methods enables the algorithm to distinguish between hand open and hand close activities by using sEMG signal collected by only one channel. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Novel Method for Detecting Breast Cancer Location Based on Growing GA-FCM Approach
Published 2020“…In this paper, we used manual methods and use of FCM as the function of genetic algorithm fitness. …”
Get full text
Get full text
Get full text
Article -
7
Wood texture detection with conjugate gradient neural network algorithm
Published 2017“…The experiments are based on artificial neural network (ANN) algorithm that used back propagation and conjugate gradient method of training function in the process of identification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
Get full text
Get full text
Get full text
Thesis -
10
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
11
Integrated face detection approach for far image application
Published 2016“…The last stage of the algorithm is to apply the Euler method, in which its function is to search for the facial features. …”
Get full text
Get full text
Thesis -
12
Improved expectation maximization algorithm for Gaussian mixed model using the kernel method
Published 2013“…We look at several issues encountered when calculating the maximum likelihood estimates of the Gaussian mixed model using an Expectation Maximization algorithm. Firstly, we look at a mechanism for the determination of the initial number of Gaussian components and the choice of the initial values of the algorithm using the kernel method. …”
Get full text
Get full text
Get full text
Article -
13
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
Get full text
Get full text
Thesis -
14
Cars detection in stitched image using morphological approach
Published 2017“…The method is improved by using algorithm which removes noise by sizes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
16
Benchmarking in silico tools for the functional assessment of DNA variants using a set of strictly pharmacogenetic variants
Published 2019“…A prediction method that integrates an assortment of algorithms, each assigned an empirically optimised weighting, may be established in the future for the functional assessment of pharmacogenetic variants.…”
Get full text
Get full text
Get full text
Article -
17
Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake
Published 2014“…This paper presents a new method to localise iris by using Fuzzy Centre Detection (FCD) scheme and active contour Snake. …”
Get full text
Get full text
Get full text
Article -
18
Smart fall detection by enhanced SVM with fuzzy logic membership function
Published 2023“…So far, the most widely used fall prediction methods collect data from inertial measurement unit (IMU) sensors. …”
Get full text
Get full text
Get full text
Article -
19
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
text::Thesis -
20
Reduced complexity optimum detector for block data transmission systems
Published 2010Get full text
Article
