Search Results - (( using function based algorithm ) OR ( key detection method algorithm ))
Search alternatives:
- method algorithm »
- using function »
- key detection »
-
1
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
Get full text
Get full text
Get full text
Article -
4
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
5
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
Get full text
Get full text
Thesis -
6
Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism
Published 2025“…This thesis presents an innovative approach to enhance examination fairness through automated cheating detection using an improved YOLOv8 algorithm integrated with an attention mechanism. …”
Get full text
Get full text
Get full text
Thesis -
7
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
8
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
9
A development of a damage monitoring system using an embedded fiber Bragg grating sensors
Published 2019“…The voltage normalization algorithm has reduced the output voltage variations from 26 data/minute to 17 data/minute with the elimination of pre-calibration each time before use. …”
Get full text
Get full text
Research Report -
10
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Cabbage disease detection system using k-NN algorithm
Published 2022“…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
14
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…Our key contributions include the development of efficient keyframes selection methods and classification models, addressing the challenge of violence detection in dynamic surveillance scenarios. …”
Get full text
Get full text
Get full text
Article -
15
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis -
16
Artificial neural networks and genetic algorithm for transformer winding/insulation faults
Published 2008“…Genetic Algorithm is used to derive the optimal key gas ratios to enhance the accuracy of fault detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
Get full text
Get full text
Article -
18
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…The peak detection algorithm identifies key signal features, while PSO optimizes the peak prominence and width parameters to minimize the mean absolute error (MAE) in chew count estimation. …”
Get full text
Get full text
Get full text
Article -
19
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Ulcer detection and classification of wireless capsule endoscopy images using RGB masking
Published 2016“…We have proposed color detection method in RGB color space as it is a key technique of color image interpretation and recognition, as well as suitable for Ulcer detection in WCE images. …”
Get full text
Get full text
Article
