Search Results - (( using vector method algorithm ) OR ( using action method algorithm ))
Search alternatives:
- method algorithm »
- vector method »
- action method »
- using action »
-
1
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…For both indoor and outdoor scene, the proposed algorithm outperforms the other methods with accuracy 97% and 100%. …”
Get full text
Get full text
Thesis -
2
Use of base case Jacobians in power flow solution under topological changes
Published 2002“…Fast decoupled Newton-Raphson method is the most widely used algorithm for load flow analysis needed in on-line assessment of the steady state security of a power system. …”
Get full text
Get full text
Article -
3
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…Most existing methods deal with the detection of an action after its completion. …”
Get full text
Get full text
Thesis -
4
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…After the feature extraction stage, Support Vector Machine (SVM) is used to classify the transient disturbance waveforms. …”
Get full text
Get full text
Thesis -
5
Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy
Published 2022“…A five-level cascaded H-bridge (CHB) inverter was used in the optimal DTC switching strategy because it had many voltage vectors and could be used for a variety of speed operations. …”
Get full text
Get full text
Get full text
Thesis -
6
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In recent years, several Android malware applications were developed to perform certain illegitimate activities and harmful actions on mobile devices. In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Space vehicles dynamics and control
Published 2011“…New techniques for estimating the angular velocity without rate sensors using only vector or quaternion measurement developed via Kalman filtering have been introduced and discussed. …”
Get full text
Get full text
Get full text
Book -
9
An enhancement of age and gender classification accuracy with hybrid handcrafted and deep features using hierarchical extreme learning machine / Mohammad Javidan Darugar
Published 2020“…Age and gender classification are some of the essential algorithms that have many use cases in our everyday life. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…For example, in video compression, the use of motion vectors on individual macro-blocks optimized the motion vector information. …”
Get full text
Get full text
Get full text
Book Chapter -
12
-
13
-
14
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…The eigenfaces is projected onto human faces to identify the features vector. These significant features vector are further refine using Gaussian kernel. …”
Get full text
Get full text
Undergraduates Project Papers -
15
An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system
Published 2011“…This paper proposes a new method to trace the transmission loss in deregulated power system by applying Genetic Algorithm (GA) and Least Squares Support Vector Machine (LS-SVM). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
The influence of sentiments in digital currency prediction using hybrid sentiment-based Support Vector Machine with Whale Optimization Algorithm (SVMWOA)
Published 2021“…Support Vector Machine (SVM) technique is used with the Whale Optimization Algorithm (WOA) which is inspired by the swarm optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
18
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
Get full text
Get full text
Get full text
Article -
19
A Method For Solving Mult-Objective Optimization Problem: Vector Evaluated Genetic Algorithm (Vega)
Published 2009“…However, it is impractical to solve MOOP by using classical methods due to its complexity. Genetic Algorithms (GAs) are a powerful stochastic search in solving optimization problems. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
A Study On The Effects Of Noise Level, Cleaning Method, And Vectorization Software On The Quality Of Vector Data.
Published 2007“…Noisy images are cleaned by six cleaning algorithms and then three different commercial raster to vector software are used to vectorize the cleaned images. vector Recovery Index (VRI) is the performance evaluation criteria used in this study to judge the quality of the resulting vectors compared to their ground truth data. …”
Get full text
Get full text
Conference or Workshop Item
