Search Results - candidate ((((section algorithm) OR (extraction algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Automated face localization and facial features detection using geometric information
Published 2011Get full text
Working Paper -
2
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In this regard, the aim of this study is to propose an efficient TVS algorithm with high precision and recall values, and low computation cost for detecting different types of transitions. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…Using a number of candidate detectors, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
A Fast Vertical Edge Detection Algorithm for Car License Plate Detection
Published 2009“…Next, candidate regions are extracted. Finally, the license plate area is detected. …”
Get full text
Get full text
Thesis -
8
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
Get full text
Get full text
Thesis -
9
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images
Published 2011“…The first step of most automatic exploratory tracing algorithms is collecting a number of candidate initial seed points and their initial tracing directions. …”
Get full text
Get full text
Get full text
Article -
11
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. …”
Get full text
Get full text
Book Section -
12
Dingle's Model-based EEG Peak Detection using a Rule-based Classifier
Published 2015“…In this study, the performances of four different peak models of time domain approach which are Dumpala's, Acir's, Liu's, and Dingle's peak models are evaluated for electroencephalogram (EEG) signal peak detection algorithm. The algorithm is developed into three stages: peak candidate detection, feature extraction, and classification. …”
Get full text
Get full text
Conference or Workshop Item -
13
Vertical-edge-based car-license-plate detection method
Published 2013“…Then, the candidate region based on statistical and logical operations will be extracted. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Improved fault location on distribution network based on multiple measurements of voltage sags pattern
Published 2012“…A new ranking approach is proposed to overcome multiple faulted section candidates. A large scale 11 kV network which comprises of 43 nodes and 5 branches are used to evaluate the proposed algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Development Of Hierarchical Skin-Adaboost-Neural Network (H-Skann) For Multiface Detection In Video Surveillance System
Published 2017“…This thesis proposed a technique to detect multiface in video surveillance application with strategic architecture algorithm based on the hierarchical and structural design. …”
Get full text
Get full text
Thesis -
17
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data
Published 2021“…In this paper, a semantic based unsupervised approach (KP-Rank) is proposed for keyphrase extraction. In the proposed approach, we exploited Latent Semantic Analysis (LSA) and clustering techniques and a novel frequency-based algorithm for candidate ranking is introduced which considers locality-based sentence, paragraph and section frequencies. …”
Get full text
Get full text
Article -
20
A multi-color based features from facial images for automatic ethnicity identification model
Published 2019“…The proposed model involved several phases such as skin color feature extraction, feature selection, and classification. In the feature extraction process, a dynamic skin color detection is adapted to extract the skin color information from the face candidate. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
