Search Results - (( using optimization method algorithm ) OR ( pre detection method algorithm ))
Search alternatives:
-
1
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…This study presents pre-processing methods for detecting lane detection using camera and Light Detection and Ranging (LiDAR) sensor technologies. …”
Get full text
Get full text
Get full text
Article -
2
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
3
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…In model development, Ant-Miner was used which consists of three steps. In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
Get full text
Get full text
Student Project -
4
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
Get full text
Get full text
Thesis -
5
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
6
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
7
Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification
Published 2022“…Then, the selected features are given as input to the DBN classifier which is trained using the Taylor-based bird swarm algorithm (Taylor-BSA). …”
Get full text
Get full text
Thesis -
8
-
9
Inverse problem in image processing: Image restoration
Published 2023“…The proposed MB-ES algorithm utilizes intermediate restored images to identify the optimal stopping point using PSNR and SSIM metrics, thus eliminating the need for pre-defined early stopping. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
11
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
Get full text
Get full text
Thesis -
12
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Power System State Estimation In Large-Scale Networks
Published 2010“…The Weighted Least Squares (WLS) method is the most popular technique of SE. This thesis provides solutions to enhance the WLS algorithm in order to increase the performance of SE. …”
Get full text
Get full text
Thesis -
14
Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model
Published 2020“…A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The first layer is used to detect up to superfamily and family in SCOP hierarchy, by using optimized binary SVM classification rules directly to ROC-Area. …”
Get full text
Get full text
Monograph -
16
A Subspace Approach for Extracting Signals Highly Corrupted by Colored Noise
Published 2010“…The simulation results produced by the post-modified SSA2 algorithm, show a higher degree of consistencies in detecting the VEP's P100, P200, and P300 peaks, in comparisons to the pre-modified SSA1 method. …”
Get full text
Get full text
Get full text
Citation Index Journal -
17
-
18
-
19
Brewing perfection: real-time monitoring of arabic coffee using iot and machine learning
Published 2026“…Using the YOLOv8 algorithm, a model was trained to detect and track the state of coffee in real time. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
2TSS: Two-tier semantic segmentation framework with enhancement for hotspot detection of solar photovoltaic thermal images
Published 2025“…The proposed method is designed with two subsequent stages of segmentation models, including image pre-processing at the initial of the framework. …”
Get full text
Get full text
Get full text
Article
