Search Results - object ((selection algorithm) OR (detection algorithm))
Search alternatives:
- selection »
-
1
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
Get full text
Get full text
Get full text
Article -
2
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
3
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
5
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…Artificial Bee Colony algorithm has been selected as the algorithm used in segmenting the brain tumor from MRI image. …”
Get full text
Get full text
Thesis -
6
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…To achieve such goal, this research modifies and improves the Reduction with Selective Redundancy (RSR) algorithm. In the modify algorithm, test cases would be selected according to the branch coverage if they covered different branch combination. …”
Get full text
Get full text
Thesis -
7
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Being that feature subset selection is considered a multi-objective optimization problem, this study proposed the Rao-SVM as an FSS mechanism; its algorithm-specific and parameter-less concept was also explored. …”
Get full text
Get full text
Get full text
Article -
8
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
9
Automated threshold detection for object segmentation in colour image
Published 2016“…The procedure starts with selection of optimal RGB channel. Then H(•) algorithm is applied for automated threshold detection to convert the image frames into grayscale image. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Maldroid- attribute selection analysis for malware classification
Published 2019“…Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
11
GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm
Published 2013“…The application also aims to select the best algorithm to detect chords and display the chords detection in pictorial form for easier understanding. …”
Get full text
Get full text
Final Year Project -
12
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
13
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
Get full text
Get full text
Thesis -
15
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…This research is focusing only on classification techniques. Hence, the objective of this research is to identify the best machine learning technique or algorithm on selected tool for android malware detection. …”
Get full text
Get full text
Get full text
Article -
16
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
Get full text
Get full text
Get full text
Article -
17
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
Get full text
Get full text
Thesis -
19
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
20
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis
