Search Results - (( variable affecting detection algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- affecting detection »
- variable affecting »
- stemming algorithm »
- java application »
-
1
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
2
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…However, it cannot be applied when the sample size is less than the number of predictor variables. In addressing this problem, some robust procedures for high dimensional dataset via the RFCH algorithm are developed. …”
Get full text
Get full text
Thesis -
3
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
Get full text
Get full text
Thesis -
4
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
5
Integrated face detection approach for far image application
Published 2016“…Other factors affecting face detection are illumination conditions, pose and ethnicity. …”
Get full text
Get full text
Thesis -
6
Robust Estimation Methods And Outlier Detection In Mediation Models
Published 2010Get full text
Get full text
Thesis -
7
-
8
Advanced fault detection in DC microgrid system using reinforcement learning
Published 2021“…The results showed that the improved Negative Selection Algorithm with variable sized detector has better performance than the general Negative Selection Algorithm with constant sized radius in detecting fault in DC microgrid system.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Normalized Difference Built up Index (NDBI) is also been used for the aim of detecting urban area. Through the value obtained in regression analysis, strong positive relationship exist between Land Surface Temperature (LST) as it is proved it might be affect by massive urbanization in Penang Island.…”
Get full text
Get full text
Thesis -
10
Preliminary study on fault detection using artificial neural network for water-cooled reactors
Published 2020“…The late detection of faults may result in accidents and affect workers’ safety and health. …”
Get full text
Get full text
Get full text
Article -
11
Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study
Published 2022“…The experiment shows that theANNClassifier with an F1-score of 0.957 outperforms the other nine algorithms in terms of accuracy.…”
Get full text
Get full text
Get full text
Article -
12
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…Variance inflation factor analysis and hypothesis testing analysisevaluated for determine variables affecting business analytics adoption for furtherresearch study about suggestions and direction of industrial sector.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
Get full text
Get full text
Get full text
Article -
14
Development of sorting system for oil palm in vitro shoots using machine vision approach
Published 2014“…A smart object tracking algorithm (SOTA) has been proposed for detecting and identifying the shoot on the conveyor belt. …”
Get full text
Get full text
Thesis -
15
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The artifacts are due to the beam hardening, photon starvation effect, and inappropriate correction algorithm during image reconstruction. Knowledge on factors affecting the artifacts is crucially important to minimize these artifacts. …”
Get full text
Get full text
Thesis -
16
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Although the statistical-based anomaly detection (SAD) method fascinates researchers, the low attack detection rates (also known as the detection of true positive) that reflect the effectiveness of the detection system generally persist. …”
Get full text
Get full text
Thesis -
17
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…According to the previous study, the types of different roof materials and roof surface conditions that affected by aging and weathering effects, contribute to the spectral response variability of these features. …”
Get full text
Get full text
Thesis -
18
Adaptive Control of Weld Penetration and Trajectory for Robotic GTAW
Published 1996“…The results showed that the misalignment of the progressive heat affected zone which is adjacent to the weld puddle can be detected and used for control of the weld trajectory. …”
Get full text
Get full text
Thesis -
19
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
20
