Search Results - candidate ((((electron algorithm) OR (connection algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Improvement real-time detection of moving vehicle in a dynamic scene using shadow removal method / Khairul Azman Ahmad, Mohd Halim Mohd Noor,Mohamad Adha Mohamad Idin
Published 2011“…Real-time processing is still feasible as these sophisticated algorithms are applied only a small number of candidates foreground pixels. …”
Get full text
Get full text
Research Reports -
4
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
Get full text
Get full text
Conference or Workshop Item -
5
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
Get full text
Get full text
Book Section -
6
Evaluation of different peak models of eye blink EEG for signal peak detection using artificial neural network
Published 2016“…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
Get full text
Get full text
Article -
7
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Moreover, for the proposed SBD algorithm, a comparative study is performed with state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Evaluation Of Different Peak Models Of Eye Blink Eeg For Signal Peak Detection Using Artificial Neural Network
Published 2016“…Therefore, the purpose of peak detection algorithm is to distinguish an actual peak location from a list of peak candidates. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Classification of Short Possessive Clitic Pronoun Nya in Malay Text to Support Anaphor Candidate Determination
Published 2020“…In this paper, the automatic semantic tag was used to determine the type of nya, which at the same time could determine nya as an anaphor candidate. The new algorithms and MalayAR architecture were proposed. …”
Get full text
Get full text
Article -
10
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Classification of short possessive clitic pronoun Nya in Malay text to support anaphor candidate determination
Published 2020“…In this paper, the automatic semantic tag was used to determine the type of nya, which at the same time could determine nya as an anaphor candidate. The new algorithms and MalayAR architecture were proposed. …”
Get full text
Get full text
Get full text
Article -
12
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
13
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
14
Breast Cancer Prediction Model Using Machine Learning
Published 2021“…Modelling with machine learning is done by selecting three candidate algorithms, namely Random Forest, Support Vector Machine, and Logistic Regression. …”
Get full text
Get full text
Get full text
Article -
15
Improved fault location on distribution network based on multiple measurements of voltage sags pattern
Published 2012“…A new ranking approach is proposed to overcome multiple faulted section candidates. A large scale 11 kV network which comprises of 43 nodes and 5 branches are used to evaluate the proposed algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks
Published 2015“…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
Get full text
Get full text
Get full text
Article -
17
Intelligent surveillance system for street surveillance
Published 2017“…For the tracking algorithm, the effectiveness between colour, edge and texture features for target and candidate blobs were analysed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain
Published 2016“…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper
