Search Results - (( _ detection method algorithm ) OR ( feed formulation based algorithm ))*
Search alternatives:
- formulation based »
- method algorithm »
- feed formulation »
-
1
A pond-surface-based Biofloc-farm health-monitoring system for African catfish using deep learning methods
Published 2022“…The research methodology stages are; (i) Acquisition of daily recordings of the surfaces of fish ponds and their respective daily health, (ii)Formulating and developing a fish health monitoring algorithm based on their behaviour from the surface, (iii) Selection of training data based on the recordings and health,(iv) performance metric evaluation, (v) Assessment of experimental results of the Biofloc Fish Health Monitoring System On Pond Surface algorithm, and (vi) final report and project wrap-up. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
POTENTIAL GROUPER FEED FORMULATION BASED ON EVOLUTIONARY ALGORITHM CONCEPT WITH A UNIQUE SELECTION OPERATOR
Published 2018“…Therefore, turning to formulated feed mix is the alternative. However, the issue is on its cost while providing quality feed mix. …”
Get full text
Get full text
Article -
3
Potential grouper feed formulation based on evolutionary algorithm concept with a unique selection operator
Published 2018“…However, the issue is on its cost while providing quality feed mix.That leads to the search for an approach which could provide the most suitable feed ingredients and nutrients.One potential approach is the Evolutionary Algorithm (EA) which has been used to solve the feed formulation problems in poultry, shrimp and cattle.Hence, in this study, an EA-based approach with a refinement on using the standard deviation in the strategy of tournament selection has been proposed to minimize the total cost in formulating the feed of grouper fish.Results show that the lowest cost can be accepted while satisfying the nutrient requirements of grouper fish.…”
Get full text
Get full text
Get full text
Article -
4
An Improved Evolutionary Algorithm in Formulating a Diet for Grouper
Published 2023“…The preliminary findings of SR-SD-EA show that the obtained cost computed based on the Best-So-Far feed formulation as the solution is comparable, while all the crucial constraints are fulfilled…”
Get full text
Get full text
Get full text
Article -
5
A multi-criteria proximal bundle-based optimization approach to chick-mash feed formulation
Published 2016“…The algorithm of this method is based on the objective functions classification. …”
Get full text
Get full text
Article -
6
An Evolutionary Algorithm: An Enhancement of Binary Tournament Selection for Fish Feed Formulation
Published 2022“…*e proposed selection operator has been experimented within fish feed formulation in grouper fish farming as a case study on finding the minimum cost and fulfilling constraints. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Optimisation of fed-batch fermentation process using deep reinforcement learning
Published 2023“…The proposed deep reinforcement learning algorithm, which integrates an artificial neural network with traditional reinforcement learning, was formulated based on the optimisation objective by manipulating only the substrate feeding rate. …”
Get full text
Get full text
Get full text
Thesis -
9
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…In data preprocessing, a clean and useful data is produced and become as an input for association analysis process. Then, the Apriori algorithm is used to formulate association ruleset in association analysis process and is known as the CTI Association Ruleset (CTI-AR). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Mixed-variable ant colony optimisation algorithm for feature subset selection and tuning support vector machine parameter
Published 2017“…The objective of this paper is to formulate an algorithm for tuning SVM parameters and feature subset selection.This can be achieved by simultaneously performing the selection of feature subset and tuning SVM parameters tasks. …”
Get full text
Get full text
Article -
11
Development of deep reinforcement learning based resource allocation techniques in cloud radio access network
Published 2022“…To capture the spatiotemporal channel state information (CSI), the second proposed algorithm adopts machine learning techniques with anchor graph hashing to extract generalized features before feeding them into the DQN. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
13
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
15
Multi road marking detection system for autonomous car using hybrid- based method
Published 2018“…The proposed system consists of a combination of Inverse Perspective Transform method, an image enhancement method and edge detection method. …”
Get full text
Get full text
Get full text
Thesis -
16
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Obfuscated Malware Detection: Impacts on Detection Methods
Published 2024Subjects:Conference Paper -
18
Amplitude independent versus amplitude dependent muscle activity detection algorithms: a comparative study
Published 2020“…Therefore, the performance of the muscle activity detection algorithms should not be affected by the involuntary amplitude variations of the sEMG signal in order to achieve reliable control of robotic devices intended for disabled people.To accentuate the importance of the amplitude independent muscle activity detection methods over the amplitude dependent detection methods, a comparative study has been conducted in this paper between the performance of an amplitude independent muscle activity detection algorithm (FLA-MSE algorithm) and three amplitude dependent algorithms with respect to the detection capability of weak muscle activities and with respect to the immunity against false alarms. …”
Get full text
Get full text
Get full text
Article -
19
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
20
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Thesis
