Search Results - adoption two different ((estimation algorithm) OR (detection algorithm))
Search alternatives:
- estimation algorithm »
- two different »
- adoption two »
-
1
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
2
Intelligent image noise types recognition and denoising system using deep learning / Khaw Hui Ying
Published 2019“…The proposed High-density Impulse Noise Detection and Removal (HINDR) model mainly consists of two parts: the impulse noise removal and impulse noisy pixel detection for restoration. …”
Get full text
Get full text
Get full text
Thesis -
3
An active lower-extremity exoskeleton for synchronous mobility assistance in lifting and carrying manual handling task / Sado Fatai
Published 2019“…The control system can assist wearers’ movement by a new synergy of three controller algorithms: a dual unscented Kalman filter (DUKF) for trajectory estimation and model update, an impedance controller for generation of assistive torque, and a new supervisory control algorithm for pilot movement detection and synchronization with the exoskeleton. …”
Get full text
Get full text
Get full text
Thesis -
4
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
5
Weighting method for modal parameter based damage detection algorithms
Published 2011“…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
Get full text
Get full text
Article -
6
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
7
Evolutionary approach for combinatorial testing of software product lines
Published 2020“…The approaches are (1) adopting an Estimation of Distribution Algorithm approach to aid the construction of a covering array driven by second order feature dependence, and (2) construct a feature configuration dependence graph to assist in building the variable-strength covering array. …”
Get full text
Get full text
Thesis -
8
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Dense sampling and Difference of Gaussian (DoG) have been used in previous studies but were unable to detect salient interest points due to complex appearance of food images. …”
Get full text
Get full text
Thesis -
12
-
13
End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels
Published 2021“…The Normalized Mean Square Error (NMSE) and the BER perfor�mances for different DVB-S2X system MODCODs are investigated and the results for these algorithms are compared with the conventional Minimum Mean Square Er�ror (MMSE) and Least Square (LS) channel estimation techniques. …”
Get full text
Get full text
Thesis -
14
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…In order to find the best filtration algorithm, two stages were adopted in this study. The first stage was the validation of the performance of the previous algorithms. …”
Get full text
Get full text
Get full text
Thesis -
15
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of selected features have been adopted to train four machine-learning based classifiers. …”
Get full text
Get full text
Article -
16
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…Finally, the predictive capability of valid NLHRS models has also been tested and adjusted for different strata of the population. Firstly, the study concludes that the adoptions of the flexible approach in estimation can model the binary feature of CVDs and non-linear paths in the complex path models. …”
Get full text
Get full text
Thesis -
17
Fuzzy Type-1 Triangular Membership Function Approximation Using Fuzzy C-Means
Published 2020Get full text
Get full text
Conference or Workshop Item -
18
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
19
A bit-serial sum of absolute difference accelerator for variable block size motion estimation of H.264
Published 2009Get full text
Get full text
Conference or Workshop Item -
20
