Search Results - (( using set method algorithm ) OR ( basic detection method algorithm ))
Search alternatives:
- method algorithm »
- basic detection »
- set method »
- using set »
-
1
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
2
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
4
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…We propose a modified reweighted fast consistent and high breakdown point (MRFCH) estimator to make it applicable to high-dimensional settings. The basic idea of our proposed method is to modify the Mahalanobis distance so that it uses only the diagonal elements of the scatter matrix in the computation of the RFCH algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
6
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Based on previous researches, most existing segmentation methods focused on a specific environment. Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
Get full text
Get full text
Thesis -
7
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Image Based Oil Palm Tree Crowns Detection
Published 2020“…Canny edge segmentation algorithm is used after that to determine the edge of the crowns by differentiate the end of object and background. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
Conference Paper -
10
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
11
Boosted HOG features and its application on object movement detection
Published 2018“…On that basis, we create a new feature with boosting algorithm to obtain more accurate result. In detecting vehicles part, we use the shadow underneath vehicle as the feature, so we can utilize it to detect vehicles in daytime. …”
Get full text
Get full text
Article -
12
Boosted HOG features and its application on object movement detection
Published 2018“…On that basis, we create a new feature with boosting algorithm to obtain more accurate result. In detecting vehicles part, we use the shadow underneath vehicle as the feature, so we can utilize it to detect vehicles in daytime. …”
Get full text
Get full text
Article -
13
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
14
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
15
Robust Kernel Density Function Estimation
Published 2010“…The distance of observations from the center of data set is incorporated in the formulation of the first outlier detection method in unimodal distribution. …”
Get full text
Get full text
Thesis -
16
Defect Detection And Classification Of Silicon Solar Wafer Featuring Nir Imaging And Improved Niblack Segmentation
Published 2016“…The classification combines the analysis of defect intensity features, the application of unsupervised k-mean clustering and multi-class SVM algorithms. The methods have been applied for detecting, clustering and classification polycrystalline solar wafer images, corresponding to defects such as micro cracks, stain, and fingerprints. …”
Get full text
Get full text
Thesis -
17
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…The clustering results have been validated using the F-measure, Entropy and Purity methods of measurement and compared with two common methods, which are information extraction and textual document clustering, for example, K-means, Frequent Item-Set, Hierarchical Clustering Algorithms and Oracle Text. …”
Get full text
Get full text
Thesis -
18
Integrated artificial intelligence-based classification approach for prediction of acute coronary syndrome
Published 2014“…The following results were obtained when classification of the ACS types used the conventional “single AI-based” methods. …”
Get full text
Get full text
Get full text
Thesis -
19
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis
