Search Results - ((((generation algorithm) OR (compression algorithms))) OR (detection algorithm))
Search alternatives:
- compression algorithms »
- generation algorithm »
-
1
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
2
Image authentication using Zernike moment watermarking
Published 2013“…Experimental results showed that this algorithm achieves better bit error rate against JPEG compression, rotation, scale and noise attacks in comparison with other reviewed schemes in this work. …”
Get full text
Get full text
Thesis -
3
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The clustering algorithm consists of two components: the temporal micro-clusters generation and the temporal micro clusters merging. …”
Get full text
Get full text
Thesis -
4
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
5
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…Active detection algorithm generates disturbances at the output by Positive feedback and Continuous feedback signal injection which is based on DQ implementation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
Get full text
Get full text
Thesis -
7
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
Get full text
Get full text
Get full text
Article -
8
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
9
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
Get full text
Get full text
Get full text
Article -
10
Evaluation of sparsifying algorithms for speech signals
Published 2012“…It has also played an important role in compressive sensing algorithms since it performs well in sparse signals. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
12
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…In this paper we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well. …”
Get full text
Get full text
Conference or Workshop Item -
13
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…It then divides the compressed database into a set of conditional databases (a special kind of projected database), each associated with one frequent item or pattern fragment, and mines each such database separately.For a large database, constructing a large tree in the memory is a time consuming task and increase the time of execution.In this paper we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well.Our algorithm works based on prime factorization, and is called Frequent Pattern- Prime Factorization (FPPF).…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Improved thresholding and quantization techniques for image compression
Published 2017“…Thus, the proposed algorithm provides an alternative technique to compress the digital image.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Generation of new low-complexity March algorithms for optimum faults detection in SRAM
Published 2023“…A high-complexity test algorithm like the March MSS (18N) can guarantee the detection of all unlinked static faults in SRAM. …”
Get full text
Get full text
Get full text
Article -
16
Wavelet coding design for image data compression
Published 2005“…Also, wavelet ventor quantisation multiresolution codebook generation is discussed. General discription of the proposed image compression algorithm with its feature is presented. …”
Get full text
Get full text
Article -
17
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
Get full text
Get full text
Thesis -
18
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The prime numbers with the size of 256, 512, and 1024 bits are generated using the proposed modified algorithm. The performance of the proposed modified Miller-Rabin was analysed in terms of the time taken to detect the prime numbers and compare the time taken for generating the prime numbers using original Miller-Rabin method. …”
Get full text
Get full text
Get full text
Thesis -
19
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
Get full text
Get full text
Thesis -
20
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…First, the new data compression algorithm is proposed for compressing sensed data before it gets transmitted to the sink. …”
Get full text
Get full text
Get full text
Thesis
