Search Results - (( data detection method algorithm ) OR ( features extraction path algorithm ))
Search alternatives:
- features extraction »
- method algorithm »
- extraction path »
- data detection »
- path algorithm »
-
1
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…The feature enhancement task is performed by applying the Path Aggregation Network (PANet) and Spatial Pyramid Pooling Network (SPPNet) algorithms, which are deployed to enhance the extracted and generated features. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Oil Palm Yield Data Collection Using Image Processing
Published 2021“…In the area of image processing, this job involves different techniques such as pre-processing, feature extraction and ANN. The tools used in training the ANN is the TensorFlow Object Detection API. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
6
NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition
Published 2006“…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
Get full text
Get full text
Article -
7
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
Published 2006“…This paper presents a method to extract existing speech features in dynamic time warping path which originally was derived from LPC. …”
Get full text
Conference or Workshop Item -
8
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…This development and study of the path extract method carries significance in areas of EDA and debug diagnosis work.…”
Get full text
Get full text
Thesis -
9
Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition
Published 2006“…This paper presents a method to extract existing speech features in dynamic time warping path which originally was derived from LPC. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Online Mapping-Based Navigation System for Wheeled Mobile Robot in Road Following and Roundabout
Published 2018“…A road mapping and feature extraction for mobile robot navigation in road roundabout and road following environments is presented in this chapter. …”
Get full text
Get full text
Get full text
Book Chapter -
11
Deep Learning-Based Geomagnetic Navigation Method Integrated with Dead Reckoning
Published 2023“…First, a multidimensional geomagnetic feature extraction method is presented which can extract magnetic features from spatial and temporal aspects. …”
Get full text
Get full text
Get full text
Article -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
13
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
16
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
17
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
18
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Classification Analysis Of High Frequency Stress Wave For Autonomous Detection Of Defect In Steel Tubes
Published 2014“…Interpretation of propagated high frequency stress wave signals in steel tubes is noteworthy for defect identification.This paper demonstrated a successful new approach for autonomous defect detection in steel tubes using classification analysis of high frequency stress waves.Classification analysis using Principal Component Analysis (PCA) algorithm involved feature extraction to reduce the dimensionality of the complex stress waves propagation path.Two defective tubes containing a slot defect of different orientation and a reference tube are inspected using Vibration Impact Acoustic Emission (VIAE) technique.The tubes are externally excited using impact hammer.The variation of stress wave transmission path are captured by high frequency Acoustic Emission sensor.The propagated stress waves in the steel tubes are classified using PCA algorithm.Classification results are graphically illustrated using a dendrogram that demonstrated the arrangement of the natural clusters of the stress wave signals.The inspection of steel tubes showed good recognition of defect in circumferential and longitudinal orientation.This approach successfully classified stress wave signals from VIAE testing and provide fast and accurate defect identification of defective steel tubes from non-defective tubes. …”
Get full text
Get full text
Get full text
Article
