Search Results - (( using function method algorithm ) OR ( key detection method algorithm ))
Search alternatives:
- method algorithm »
- function method »
- using function »
- key detection »
-
1
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…The labelling header allows two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgement immediately after file modification. Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
Get full text
Get full text
Get full text
Article -
4
Adapting And Enhancing Hybrid Computational Methods For RNA Secondary Structure Prediction
Published 2011“…This thesis presents a hybrid method to predict the RNA pseudoknot secondary structures by combining detection methods with dynamic programming algorithms.…”
Get full text
Get full text
Thesis -
5
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
6
Improved static and dynamic FBG sensor system for real-time monitoring of composite structures
Published 2017“…Thus, the designation of this research study is to improve the current FBG based real-time monitoring system with the use of certain functions and algorithms, that are the instant mesh-grid function, voltage normalization algorithm, CC-LSL algorithm, and FFT function. …”
Get full text
Get full text
Thesis -
7
Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism
Published 2025“…This thesis presents an innovative approach to enhance examination fairness through automated cheating detection using an improved YOLOv8 algorithm integrated with an attention mechanism. …”
Get full text
Get full text
Get full text
Thesis -
8
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Next, a multi-directional interpolation (MDI) technique is proposed. The method is used to estimate the lost coefficients in the wavelet-domain. …”
Get full text
Get full text
Thesis -
9
Personal identification by Keystroke Pattern for login security
Published 2001“…Several other factors such as momentum, learning rate and various weight initialization were used for comparison. Three types of weight initialization were used, including Nguyen-Widrow (NW), Random and Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
10
AI Adoption for Steam Boiler Trip Prevention in Thermal Power Plants
Published 2025“…These findings collectively emphasize the potential of AI-driven methods in enhancing early detection and prevention of boiler trips, thereby contributing to improved operational safety and efficiency. ?…”
Article -
11
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
13
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Terrain awareness mobility model to support outdoor mobility for people with vision impairment
Published 2023“…TAM2 contains three main components; user model, terrain detection model, and learning model. For the prototyping phase, the study employed the deep learning detection framework YOLOv4-tiny algorithm to implement a real-time terrain detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
A development of a damage monitoring system using an embedded fiber Bragg grating sensors
Published 2019“…The voltage normalization algorithm has reduced the output voltage variations from 26 data/minute to 17 data/minute with the elimination of pre-calibration each time before use. …”
Get full text
Get full text
Research Report -
16
-
17
Cabbage disease detection system using k-NN algorithm
Published 2022“…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
19
Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios
Published 2022“…Our key contributions include the development of efficient keyframes selection methods and classification models, addressing the challenge of violence detection in dynamic surveillance scenarios. …”
Get full text
Get full text
Get full text
Article -
20
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis
