Search Results - (( using function a algorithm ) OR ( basic detection method algorithm ))
Search alternatives:
- method algorithm »
- basic detection »
- using function »
- a algorithm »
- function a »
-
1
Cars detection in stitched image using morphological approach
Published 2017“…The method is improved by using algorithm which removes noise by sizes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
Web Camera Application For Motion Detection
Published 2003“…This self-created motion detection software is then installed and run on the PC to function as a complete intelligent motion detection system.…”
Get full text
Get full text
Thesis -
3
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Based on previous researches, most existing segmentation methods focused on a specific environment. Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
Get full text
Get full text
Thesis -
4
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
5
Boosted HOG features and its application on object movement detection
Published 2018“…This paper presents a popular method called boosted HOG features to detect the pedestrians and vehicles in static images. …”
Get full text
Get full text
Article -
6
Boosted HOG features and its application on object movement detection
Published 2018“…This paper presents a popular method called boosted HOG features to detect the pedestrians and vehicles in static images. …”
Get full text
Get full text
Article -
7
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
8
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…However, the basic idea is the same - the total bandwidth is sensed using coarse resolution energy detection, then, fine sensing is applied to the portion of interest. …”
Get full text
Get full text
Thesis -
9
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
Get full text
Learning Object -
10
Robust Kernel Density Function Estimation
Published 2010“…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
Get full text
Get full text
Thesis -
11
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…The tracking algorithm determines the angles which are used to determine the position of solar tracker. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
13
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…It should be analyzed by using a more reliable method such as a malware analyzer. …”
Get full text
Get full text
Thesis -
17
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
18
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
19
-
20
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis
