Search Results - adoption _ differences ((detection algorithm) OR (function algorithm))
Search alternatives:
-
1
-
2
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…The spike encoding was used for feature extraction. The algorithm for this learning model adopted the reward-modulated STDP. …”
Get full text
Get full text
Monograph -
3
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…A baseline set which is adopted from an established eSense meter value was also coded into the prototype. …”
Get full text
Get full text
Thesis -
4
Application of target detection method based on convolutional neural network in sustainable outdoor education
Published 2023“…The acquisition system of underwater camera information of manned submersibles is designed through the Single Shot-MultiBox Detector algorithm of deep learning. Furthermore, CNN is adopted to classify the underwater target images, which realizes the intelligent detection and classification of underwater targets. …”
Get full text
Get full text
Article -
5
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The obtained result from the twelve deployed ML algorithms for the standalone intelligent ML-APS relay classifier modification without communication medium adoption for transmitting and receiving the updated relay operation settings during network configuration changes. …”
Get full text
Get full text
Thesis -
6
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
7
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
8
-
9
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
10
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…The algorithms are used to generate test cases for nine different Boolean expressions of different size and complexities. …”
Get full text
Get full text
Thesis -
11
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
12
An Arithmetic-Trigonometric Optimization Algorithm with Application for Control of Real-Time Pressure Process Plant
Published 2022“…The proposed algorithm adopts different trigonometric functions, namely sin, cos, and tan, with the conventional sine cosine algorithm (SCA) and arithmetic optimization algorithm (AOA) to improve the convergence rate and optimal search area in the exploration and exploitation phases. …”
Get full text
Get full text
Article -
13
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
14
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
Get full text
Get full text
Thesis -
16
Enhancing three variants of harmony search algorithm for continuous optimization problems
Published 2021“…Different variants of HS introduced in the literature to enhance the algorithm and fix its problems, but in most cases, the algorithm still has a slow convergence rate. …”
Get full text
Get full text
Get full text
Article -
17
Remotely sensed imagery data application in mangrove forest: a review
Published 2018“…All types of measurements related to the mangrove forest ecosystem, such as detection of land cover changes, species distribution mapping and disaster observation should take advantage of the advanced technology; for example, adopting the digital image processing algorithm coupled with high-resolution image available nowadays. …”
Get full text
Get full text
Get full text
Article -
18
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Multisensor Data Fusion Algorithm for Contactless 3D Position Measurement for Post-Stroke Hand Rehabilitation
Published 2018“…Evaluation of potential commercial-grade stereo-vision systems have been performed and fingertip detection algorithms have been proposed and evaluated. …”
Get full text
Get full text
Monograph -
20
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper
