Search Results - (( _ application during algorithm ) OR ( its detection based algorithm ))
Search alternatives:
- application during »
- during algorithm »
- detection based »
- its detection »
-
1
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…The fault syndrome based on read operations of the proposed algorithm is generated to determine its diagnostic capability. …”
Get full text
Get full text
Thesis -
2
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
3
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Monograph -
4
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
5
Development of an efficient algorithm for fetal heart rate detection: a hardware approach
Published 2006“…The algorithm is based on cross-correlation, adaptive thresholding and statistical properties in the time domain. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…From the experiments towards 12 benchmark and two outbreak datasets, the improved DCA is proven to have a better detection result than its previous version in terms of sensitivity, specificity, false detection rate and accuracy.…”
Get full text
Get full text
Article -
7
-
8
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022“…YOLOv7 is chosen as the object detection algorithm to detect sun, while Q-learning is chosen as the algorithm for reinforcement learning to control the motors. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
MelScan: An Android Application for Early Detection of Melanoma
Published 2014“…Due to time constraints, the scope of this study was narrowed to analyzing current image processing technology used in melanoma detection, especially on the Android mobile platform, developing an Android application that can use one of the image processing algorithms for melanoma detection, and to improve accuracy of melanoma detection, in particular during its early stages. …”
Get full text
Get full text
Final Year Project -
10
An adaptive anomaly threshold in artificial dendrite cell algorithm
Published 2017“…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
Get full text
Get full text
Get full text
Thesis -
12
A new algorithm for human face detection using skin color tone
Published 2013“…Human face recognition systems have gained a considerable attention during last decade due to its vast applications in the field of computer and advantages over previous biometric methods. …”
Get full text
Get full text
Get full text
Article -
13
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
Get full text
Get full text
Get full text
Thesis -
14
Analysing machine learning models to detect disaster events using social media
Published 2023text::Thesis -
15
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…The assessment was conducted by observing the performance of each algorithm and comparing its performance with other algorithms when lane-splitting data were applied. …”
Get full text
Get full text
Get full text
Thesis -
16
Process monitoring and fault detection in nonlinear chemical process based on multi-scale Kernel Fisher discriminant analysis
Published 2015“…The wavelet coefficients obtained during the analysis are used as input for the algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
18
Moving object detection at night
Published 2007“…Detection of moving object in during day light has been an active research areas and variety of well established algorithms have been proposed. …”
Get full text
Get full text
Thesis -
19
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…A case study was reported to provide evidence of the feasibility of the approach and its benefits in increasing the rate of fault detection and reduction in regression testing effort. …”
Get full text
Get full text
Get full text
Article -
20
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis
