Search Results - candidate ((((conversion algorithm) OR (control algorithm))) OR (detection algorithm))
Search alternatives:
- conversion algorithm »
-
1
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…This thesis aims to propose a fast vertical edge detector using Vertical Edge Detection Algorithm (VEDA) and to build a Car License Plate Detection (CLPD) method. …”
Get full text
Get full text
Thesis -
2
Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network
Published 2016“…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
Get full text
Get full text
Article -
3
A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam
Published 2021“…The proposed MPPT algorithm is used to maximize a conversion efficiency of a PV array. …”
Get full text
Get full text
Get full text
Thesis -
4
Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network
Published 2016“…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The algorithms were examined on two real datasets, namely, NSL-KDD and Landsat. …”
Get full text
Get full text
Thesis -
6
3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain
Published 2016“…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
8
-
9
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
10
Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah
Published 2010“…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
Get full text
Get full text
Research Reports -
11
-
12
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
Get full text
Get full text
Research Reports -
13
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…Using data obtained from one of the leading telecommunication companies in Malaysia, we show that the proposed algorithm has successfully not only detected fraud calls as suspected by the company, but also to identify suspicious calls which can be candidates of fraud call. …”
Get full text
Get full text
Conference or Workshop Item -
17
Integrated face and facial components detection
Published 2015“…The system detects face, nose and mouth using three different classifiers, which were created based on the Viola-Jones method [1] and the eyes were detected using an Eye Detection method that consists of resolution reduction, identification of the eye candidates using eye filter [2] and eyes localization based on mean comparison. …”
Get full text
Get full text
Conference or Workshop Item -
18
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Clustering method is a technique used for comparisons reduction between the candidates records in the duplicate detection process. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
Get full text
Get full text
Conference or Workshop Item -
20
Preliminary finding on the switching control algorithm for the stabilization of the DC-DC Zeta converter.
Published 2018“…We derive a switching control law based on a control Lyapunov function candidate to navigate the states to the operating point. …”
Get full text
Get full text
Conference or Workshop Item
