Search Results - (( using simulation method algorithm ) OR ( basic detection based algorithm ))
Search alternatives:
- simulation method »
- method algorithm »
- basic detection »
- detection based »
-
1
Development of a new nonlinear filtering algorithm for impulse noise reduction
Published 2020Get full text
Get full text
Research Report -
2
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…Outlier detection and classification algorithms play a critical role in statistical analysis. …”
Get full text
Get full text
Get full text
Article -
3
Review of Wheat Disease Classification and Severity Detection Models
Published 2023“…This paper mainly aims to explain deep learning-based wheat diseases identification algorithm, and to discuss the benefits and drawbacks of present wheat disease detection approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Numerical Analysis of structural batteries response with the presence of uncertainty
Published 2023“…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Article -
6
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
Get full text
Get full text
Thesis -
7
Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty
Published 2023“…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Robust Kernel Density Function Estimation
Published 2010“…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
Get full text
Get full text
Thesis -
9
-
10
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
12
Shot boundary detection based on orthogonal polynomial
Published 2019“…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. …”
Get full text
Get full text
Get full text
Article -
13
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
Get full text
Get full text
Thesis -
14
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
15
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Monograph -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
17
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
18
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
19
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
20
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph
