Search Results - (( variable detection new algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- variable detection »
- java application »
- detection new »
- new algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. …”
Get full text
Get full text
Article -
3
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
4
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The proposed system uses a fast and reliable method to detect traffic congestions. The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
5
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
7
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Thesis -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
9
Robust Estimation Methods And Outlier Detection In Mediation Models
Published 2010Get full text
Get full text
Thesis -
10
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
11
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
Get full text
Get full text
Article -
12
Predicting Survey Responses: How and Why Semantics Shape Survey Statistics on Organizational Behaviour
Published 2014“…Some disciplines in the social sciences rely heavily on collecting survey responses to detect empirical relationships among variables. We explored whether these relationships were a priori predictable from the semantic properties of the survey items, using language processing algorithms which are now available as new research methods. …”
Get full text
Get full text
Get full text
Article -
13
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
14
An Automated Method For Model-Plant Mismatch Detection And Correction In Process Plants Employing Model Predictive Control (MPC)
Published 2012“…When the mismatch indicated by the variable (e/u) exceeds the threshold limit, auto-correction of the model gain of the controller is made to match with the new plant gain. …”
Get full text
Get full text
Final Year Project -
15
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
Get full text
Get full text
Get full text
Book Chapter -
16
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…When the environment is changed the algorithm may fail to adapt itself to the new configuration. …”
Get full text
Get full text
Final Year Project -
17
Video surveillance: explosion detection
Published 2025“…By leveraging three motion-based variables, including motion ratio, new pixel ratio and optical flow values, together with three detection approaches, namely global detection, non-eroded detection and eroded detection, the system demonstrates the effectiveness of motion based methods in detecting explosions at an early stage with acceptable performance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Development of new code for optical code division multiple access systems
Published 2011“…This work proposed algorithms for designing a new code with variable cross-correlation properties for the SAC-OCDMA system, namely, Random Diagonal (RD) code. …”
Get full text
Thesis -
19
-
20
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…We propose an optimized crossover scheme that changes the crossover operation from being fixed-length to random-length, which has been designed to fit for the proposed variable length DE. We refer to the new DE algorithm as random variable length crossover DE (rvlx- DE) algorithm. …”
Get full text
Get full text
Thesis
