Search Results - candidate ((((section algorithm) OR (extraction algorithm))) OR (detection algorithm))

Refine Results
  1. 1
  2. 2

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…In this regard, the aim of this study is to propose an efficient TVS algorithm with high precision and recall values, and low computation cost for detecting different types of transitions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    A Fast Vertical Edge Detection Algorithm for Car License Plate Detection by Ali Al-Ghaili, Abbas Mohammed

    Published 2009
    “…Next, candidate regions are extracted. Finally, the license plate area is detected. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images by Boroujeni, Farsad Zamani, O. K. Rahmat, Rahmita Wirza, Mustapha, Norwati, Affendey, Lilly Suriani, Maskon, Oteh

    Published 2011
    “…The first step of most automatic exploratory tracing algorithms is collecting a number of candidate initial seed points and their initial tracing directions. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
    Get full text
    Get full text
    Book Section
  12. 12

    Dingle's Model-based EEG Peak Detection using a Rule-based Classifier by Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2015
    “…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Vertical-edge-based car-license-plate detection method by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ramli, Abdul Rahman, Ismail, Alyani

    Published 2013
    “…Then, the candidate region based on statistical and logical operations will be extracted. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Improved fault location on distribution network based on multiple measurements of voltage sags pattern by Awalin, L.J., Mokhlis, Hazlie, Halim, A.H.A.

    Published 2012
    “…A new ranking approach is proposed to overcome multiple faulted section candidates. A large scale 11 kV network which comprises of 43 nodes and 5 branches are used to evaluate the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development Of Hierarchical Skin-Adaboost-Neural Network (H-Skann) For Multiface Detection In Video Surveillance System by Zakaria, Zulhadi

    Published 2017
    “…This thesis proposed a technique to detect multiface in video surveillance application with strategic architecture algorithm based on the hierarchical and structural design. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
    Get full text
    Get full text
    Article
  18. 18

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data by Aman, M., Abdulkadir, S.J., Aziz, I.A., Alhussian, H., Ullah, I.

    Published 2021
    “…In this paper, a semantic based unsupervised approach (KP-Rank) is proposed for keyphrase extraction. In the proposed approach, we exploited Latent Semantic Analysis (LSA) and clustering techniques and a novel frequency-based algorithm for candidate ranking is introduced which considers locality-based sentence, paragraph and section frequencies. …”
    Get full text
    Get full text
    Article
  20. 20

    A multi-color based features from facial images for automatic ethnicity identification model by Mohd Zamri, Osman, Mohd Aizaini, Maarof, Mohd Foad, Rohani, Nilam Nur Amir, Sjarif, Nor Saradatul Akmar, Zulkifli

    Published 2019
    “…The proposed model involved several phases such as skin color feature extraction, feature selection, and classification. In the feature extraction process, a dynamic skin color detection is adapted to extract the skin color information from the face candidate. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item