Search Results - candidate ((((extraction algorithm) OR (function algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
2
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In this regard, the aim of this study is to propose an efficient TVS algorithm with high precision and recall values, and low computation cost for detecting different types of transitions. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
An effective source number enumeration approach based on SEMD
Published 2022“…Experiment shows that SEMD can effectively restrain the end effect, and the source number enumeration algorithm based on SEMD has a higher correct detection probability than others.…”
Get full text
Get full text
Article -
5
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Human odour detection approach using machine learning
Published 2019“…In addition, 10 gasses are detected with zero values for both the entropy and the chi- square test, and these gasses are the strongest candidates to detect and classify odours. …”
Get full text
Get full text
Get full text
Thesis -
8
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…Next, candidate regions are extracted. Finally, the license plate area is detected. …”
Get full text
Get full text
Thesis -
10
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
Get full text
Get full text
Thesis -
11
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images
Published 2011“…The first step of most automatic exploratory tracing algorithms is collecting a number of candidate initial seed points and their initial tracing directions. …”
Get full text
Get full text
Get full text
Article -
13
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
Get full text
Get full text
Conference or Workshop Item -
14
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
15
Vertical-edge-based car-license-plate detection method
Published 2013“…Then, the candidate region based on statistical and logical operations will be extracted. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Development Of Hierarchical Skin-Adaboost-Neural Network (H-Skann) For Multiface Detection In Video Surveillance System
Published 2017“…This thesis proposed a technique to detect multiface in video surveillance application with strategic architecture algorithm based on the hierarchical and structural design. …”
Get full text
Get full text
Thesis -
18
Defect green coffee bean detection using image recognition and supervised learning
Published 2022“…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
Get full text
Get full text
Get full text
Academic Exercise -
19
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
20
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article
