Search Results - addition _ differences ((detection algorithm) OR (function algorithm))
Search alternatives:
-
1
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
Published 2006“…We consider two different pilot symbol assisted adaptive beamforming algorithms, Least Mean Square (LMS) and Recursive Least Square (RLS). …”
Get full text
Get full text
Thesis -
2
Development of an automated multidirectional pest sampling detection system using motorized sticky traps
Published 2021“…Different kernel functions, such as disk, diamond, square, and sphere, were used as matching functions for the insect detection and counting algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Results show that CFS-MCFA-SVM achieved 100% accuracy with only a few biomarkers for all four cancer microarray datasets, indicating the efficiency and the competing performance of the proposed algorithm in biomarker detection for microarray-based cancer classification. …”
Get full text
Get full text
Get full text
Article -
4
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…Therefore, a new reference-free damage detection algorithm is proposed. The RWPE measurements of different sensor-to-sensor pairs are applied for defining the reference-free damage index (RDI) of each sensor location. …”
Get full text
Get full text
Get full text
Thesis -
5
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…We then develop a new algorithm to address the summarizing strategies identification problem. …”
Get full text
Get full text
Thesis -
7
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
8
Human odour detection approach using machine learning
Published 2019“…The unsurpassed framework for learning algorithm to be used for human identification is Levenberg-Marquardt backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…During the implementation testing, the functionality and usability of the website assurance application have been verified by different level of computing expert users. …”
Get full text
Get full text
Get full text
Article -
10
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
A study on component-based technology for development of complex bioinformatics software
Published 2004“…Experimental results show that their approaches significantly improve the performance of protein remote protein homology detection for all three different datasets (SCOP 1.53, 1.67 and 1.73). …”
Get full text
Get full text
Monograph -
12
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…Furthermore, the efficacy of different models based on heuristic hyperparameter tuning is evaluated in which the different kernel function for Support Vector Machine, various distance metrics of k-Nearest Neighbors. …”
Get full text
Get full text
Thesis -
13
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
14
LTE-based passive radar for ground target detection and tracking
Published 2015“…Nine scenarios were carried out to investigate the system capability of detecting diverse ground moving targets which move in different speeds and different directions. …”
Get full text
Get full text
Thesis -
15
Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review
Published 2021“…Particular attention is given to different loss functions used for training segmentation based on deep learning techniques. …”
Get full text
Get full text
Article -
16
Recent Automatic Segmentation Algorithms of MRI Prostate Regions: A Review
Published 2021“…Particular attention is given to different loss functions used for training segmentation based on deep learning techniques. …”
Get full text
Get full text
Article -
17
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The overall software design is divided into three modules which are Image Acquisition, Image Processing and Object Detection, and Data Transmission module. The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
18
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…Thus, developing an effective routing algorithm to optimize network functionality is a big concern. …”
Article -
19
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Passive forward scatter radar based on LTE signal for vehicle detection and classification
Published 2018“…This thesis clarifies in details the LTE based passive forward scatter radar receiver circuit, the detection scheme and the classification algorithm. …”
Get full text
Get full text
Thesis
