Search Results - adaptive affect different ((selection algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…Two main improvements were included into the original SSA algorithm to alleviate its drawbacks and adapt it for feature selection problems. …”
    Get full text
    Get full text
    Article
  2. 2

    Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction by Abd Razak, Siti Safwana

    Published 2019
    “…Other than that, wrong information of each pixel of disparity map which can affect the accuracy of SVDM. Therefore, to overcome the causes of effected accuracy, new Stereo Matching Algorithm (SMA) based on Adaptive Weighted Bilateral Filter (AWBF) was introduced together with characterize the SMA based on quantitative and qualitative measurements and produced SMA performance were evaluate using standard taxonomy of SM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…Therefore, several studies have employed some schemes to reduce data redundancy in the clustered network before data aggregation to mitigate the problems that affects the data aggregation efficiency. This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography by Tian, Wenbin, Ramli, Mimi Faisyalini, Yang, Wuqiang, Sun, Jiangtao

    Published 2020
    “…It is crucial to select a suitable relaxation factor in iterative image reconstruction algorithms (e.g. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…In addition, using data from smartphone devices introduces a new challenge, namely, different optical zooms. This problem affects the accuracy of face recognition systems when the test and gallery images of the same person differ in terms of face-to-camera distance. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Adaptive template matching of photoplethysmogram pulses to detect motion artefact by Lim, Pooi Khoon, Ng, Siew Cheok, Lovell, Nigel Hamilton, Yu, Yong Poh, Tan, Maw Pin, McCombie, Devin, Lim, Einly, Redmond, Stephen James

    Published 2018
    “…This study aims to develop an online artefact detection system based on adaptive (dynamic) template matching, suitable for continuous PPG monitoring during daily living activities or in the intensive care units (ICUs). …”
    Get full text
    Get full text
    Article
  10. 10

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…There are different algorithms used as a regenerative braking strategy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection by Alsmadi, Issa Mohammad Ibrahim

    Published 2018
    “…In the first stage, we propose an adaptive filter-based feature selection method that is derived from the odd ratio method, used in reducing the dimensionality of feature space. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features by Khalid, Fatimah, Amjeed, Noor, O.K. Wirza, Rahmita Wirza, Madzin, Hizmawati, Azizan, Illiana

    Published 2020
    “…The proposed method consists of five main stages, starting with eye area detection using the developed Viola-Jones algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Affect classification using genetic-optimized ensembles of fuzzy ARTMAPs by Liew, W.S., Seera, M., Loo, C.K., Lim, E.

    Published 2015
    “…Training neural networks in distinguishing different emotions from physiological signals frequently involves fuzzy definitions of each affective state. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study by Daru, April Firman, Hirzan, Alauddin Maulana, Mahmod Attar Bashi, Zainab Senan, Fanani, Fajriannoor

    Published 2025
    “…The findings indicate that the proposed self-learning model based on Q-Learning can effectively identify network intrusions without requiring manual retraining, thereby offering a scalable and adaptive solution for real-time intrusion detection.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…There are a variety of algorithms in this class with different objectives, advantages and drawbacks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Detection of hemorrhage and exudates in retinal fundus image of diabetic patients by Siti Sarah, Ahmad Mansor

    Published 2016
    “…In this phase, Edge Detection, Gradient Magnitude and Region Of Interest techniques are combined to form a complete working algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The missing projection data due to metal region is detected and extracted using an improved technique of dual-step adaptive thresholding. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…Three algorithms of Linear (PURELIN), hyperbolic tangent sigmoid (TANSIG) and logistic sigmoid (LOGSIG) activation functions were selected for output layer. …”
    Get full text
    Get full text
    Thesis