Search Results - candidate ((((generation algorithm) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
- generation algorithm »
-
1
3D face candidate region detection using background subtraction / Zulfikri Paidi and Nurzaid Muhd Zain
Published 2016“…Our focus is to solve the first challenge in face registration, which is to detect and identify face region. From the experiment, it shows some promising results related to using background subtraction in face candidate region detection algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Particle swarm optimization (PSO) is used to optimize the random generation of candidate detectors and parameters associated with apriori algorithm (AA) for features selection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
4
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The results demonstrated that the proposed method could generate an optimal collision-free path. Moreover, the proposed algorithm result are compared to some common algorithms such as the A* algorithm, Probabilistic Road Map, RRT, Bi-directional RRT, and Laser Simulator algorithm to demonstrate its effectiveness. …”
Get full text
Thesis -
5
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
Get full text
Get full text
Final Year Project -
6
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
Get full text
Conference or Workshop Item -
8
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…Data vectors are generated based on the time needed, sequential and parallel candidate feature data are obtained, and the data rate is combined. …”
Article -
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…On the other hand, existing stream data learning models with limited labelling have many limitations. Most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data generated from network traffic are called concept drift. …”
Get full text
Get full text
Thesis -
10
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
11
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
12
An improved Levenshtein algorithm for spelling correction word candidate list generation
Published 2016“…The most widely used algorithm for generating candidates’ list for incorrect words is based on Levenshtein distance. …”
Get full text
Get full text
Get full text
Thesis -
13
Implementation of improved Levenshtein algorithm for spelling correction word candidate list generation
Published 2016“…The most widely used algorithm to generate the candidate list is the Levenshtein algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
15
Detection of Microcalcification Using Mammograms
Published 2004“…Various image processing techniques were applied including filters, histogram generation, thresholding and edge detection. The top hat method was applied to mammograms samples of eight patients and able to detect the microcalcification. …”
Get full text
Get full text
Final Year Project -
16
Application of Shuffled Frog Leaping Algorithm (SFLA) to long term generation expansion planning / Nurul Ulya Ibrahim
Published 2016“…This method is tested for 15 existing power plant and five generation candidates within 10 years of planning. The simulation results obtained using the proposed algorithm show that the minimum cost can be obtained for types of candidate.…”
Get full text
Get full text
Thesis -
17
-
18
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…The fade transitions are detected based on the smoothed moments energy and the moments of gradients correlation for the candidate segments. …”
Get full text
Get full text
Get full text
Thesis -
19
Skin detection using HSV color component subtraction and texture information / Rizal Mat Jusoh and Norhazimi Hamzah
Published 2010“…This thesis presents skin detection algorithm for detecting human skin regions in color images. …”
Get full text
Get full text
Research Reports -
20
Using unique-prime-factorization theorem to mine frequent patterns without generating tree
Published 2011“…For huge database it may need to generate a huge number of candidate sets. An interest solution is to design an approach that without generating candidate is able to mine frequent patterns. …”
Get full text
Get full text
Get full text
Article
