Search Results - (( based constructive method algorithm ) OR ( features detection method algorithm ))
Search alternatives:
- based constructive »
- features detection »
- method algorithm »
-
1
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
2
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…The K-means++ clustering algorithm generates candidate bounding boxes, adapting to defects of different sizes and selecting finer features earlier. …”
Get full text
Get full text
Article -
3
IMAGE STITCHING USING HARRIS CORNER & SIFT FEATURES
Published 2016“…In this project work, the objective is to implement and design an algorithm of image stitching construction with approaches of two types of feature based, which are Harris corner and Scale-Invariant Feature Transform (SIFT) features method. …”
Get full text
Get full text
Final Year Project -
4
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. …”
Get full text
Get full text
Get full text
Article -
5
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. …”
Get full text
Get full text
Article -
6
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
7
Object Localization In 3D Point Cloud
Published 2020“…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…This paper presents detection of emphasis in Malay sentences. Thus, the purpose of this research is consisting, to construct emphasized Malay speech, to evaluate pitch and intensity features on Malay words and lastly to classify the Malay words using intonation features. …”
Get full text
Get full text
Thesis -
11
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
12
Application of target detection method based on convolutional neural network in sustainable outdoor education
Published 2023“…This exploration innovatively proposes a method based on the convolutional neural network (CNN) to mine the target information in underwater camera data. …”
Get full text
Get full text
Article -
13
An adaptive face recognition under constrained environment for smartphone database
Published 2018“…In addition, this study aims to improve the performance of the face recognition method under the effect of different optical zooms by detecting the normalised facial feature region using the proposed facial feature region normalisation method. …”
Get full text
Get full text
Thesis -
14
New CFAR algorithm and circuit development for radar receiver
Published 2020“…The last MATLAB test for MSS-CA- vi CFAR with a spiky exponential model shown in Table 4.3 in chapter four shows clearly that MSS-CA-CFAR detects nine targets from ten that means the efficiency of detection of the proposed method is 90%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework
Published 2019“…Observing network traffic flow for anomalies is a common method in Intrusion Detection. More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
Get full text
Get full text
Get full text
Article -
16
Obstacle detection for Unmanned Aerial Vehicle (UAV)
Published 2022“…This study aims to develop an obstacle detection system for unmanned aerial vehicles utilising the ORB feature extraction. …”
Get full text
Get full text
Get full text
Article -
17
Malicious URL Detection with Distributed Representation and Deep Learning
Published 2023Conference Paper -
18
Analysis of dysgraphic children based on letter position / Zarith Marissa Mustafa
Published 2015“…Another objective is to construct a prototype based on Kohonen (SOM) method to classify children with potential dysgraphia symptom whether it is high, medium or low potential. …”
Get full text
Get full text
Thesis -
19
-
20
Application of slantlet transform based support vector machine for power quality detection and classification
Published 2015“…The result shows that the proposed method can detect and localize different type of single and multiple power quality signals. …”
Get full text
Get full text
Get full text
Article
