Search Results - made ((section algorithm) OR (detection algorithm))
Search alternatives:
-
1
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
Get full text
Get full text
Book Section -
2
A state of the art comparison of databases for facial occlusion
Published 2015“…The databases are useful for performing a rigorous benchmarking of face detection and recognition algorithms.…”
Get full text
Get full text
Article -
3
Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad
Published 2018“…The onset of digital imaging modality has made it possible to apply image processing algorithms to overcome the short comings of medical images such as noise, blurring and low contrast. …”
Get full text
Get full text
Book Section -
4
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
5
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
6
Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi
Published 2023“…As a consequence, tracking attendance information is made easier for student administration.…”
Get full text
Get full text
Book Section -
7
Facial emotion detection using GPSO and Lucas-Kanade algorithms
Published 2010Get full text
Working Paper -
8
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
Get full text
Get full text
Article -
9
A review of object detection in traffic scenes based on deep learning
Published 2024“…It introduces techniques for optimizing object detection algorithms, summarizes commonly used object detection datasets and traffic scene datasets, along with evaluation criteria, and performs comparative analysis of the performance of deep learning algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Real time power quality event detection using continuous wavelet transform
Published 2023“…This paper shows continuous wavelet transform performs in real time is made possible and it is a promising signal processing algorithm for power quality event detection application. � 2011 IEEE.…”
Conference paper -
11
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Final output of the algorithm summarise the bleeding detection for all patient in an excel file. …”
Get full text
Get full text
Thesis -
13
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…The further improvements can be made through lighting design, adding image enhancement algorithm and decision algorithm.…”
Get full text
Get full text
Monograph -
17
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…This research introduces Adaptive Grid-Meshed-Buffer Stream Clustering Algorithm (AGMB), that addresses these weaknesses and improves outlier detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A feature-based approach for segmenting faces
Published 2004“…Though numerous attempts have been made to detect and localize faces, these approaches have made assumptions that restrict their extension to more general cases. …”
Get full text
Get full text
Article -
19
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Before PD can be identified, detection of the PD is initially required and it can be made by ultrasonic and electrical methods. …”
Get full text
Get full text
Thesis -
20
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis
