Search Results - (( data detection method algorithm ) OR ( features extraction path algorithm ))

Refine Results
  1. 1

    A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces by A. Mostafa, Salama, Ravi, Sharran, Zebari, Dilovan Asaad, Zebari, Nechirvan Asaad, Mohammed, Mazin Abed, Nedoma, Jan, Martinek, Radek, Deveci, Muhammet, Ding, Weiping

    Published 2024
    “…The feature enhancement task is performed by applying the Path Aggregation Network (PANet) and Spatial Pyramid Pooling Network (SPPNet) algorithms, which are deployed to enhance the extracted and generated features. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Oil Palm Yield Data Collection Using Image Processing by Yee, Rachel Jee San

    Published 2021
    “…In the area of image processing, this job involves different techniques such as pre-processing, feature extraction and ANN. The tools used in training the ANN is the TensorFlow Object Detection API. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Jamaludin, Sallim, Kohbalan, Moorthy

    Published 2021
    “…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
    Get full text
    Get full text
    Article
  7. 7

    Local DTW coefficients and pitch feature for back-propagation NN digits recognition by Sudirman, R., Salleh, Shahruddin Hussain, Salleh, Sh-Hussain

    Published 2006
    “…This paper presents a method to extract existing speech features in dynamic time warping path which originally was derived from LPC. …”
    Get full text
    Conference or Workshop Item
  8. 8

    Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work by Pragasam, Matthew

    Published 2017
    “…This development and study of the path extract method carries significance in areas of EDA and debug diagnosis work.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition by Sudirman, Rubita, Salleh, Sh-Hussain, Salleh, Shaharuddin

    Published 2006
    “…This paper presents a method to extract existing speech features in dynamic time warping path which originally was derived from LPC. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Online Mapping-Based Navigation System for Wheeled Mobile Robot in Road Following and Roundabout by Ali, Mohammed A. H., Mailah, Musa

    Published 2018
    “…A road mapping and feature extraction for mobile robot navigation in road roundabout and road following environments is presented in this chapter. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  11. 11

    Deep Learning-Based Geomagnetic Navigation Method Integrated with Dead Reckoning by Yan, Suqing, Su, Yalan, Luo, Xiaonan, Sun, Anqing, Ji, Yuanfa, Kamarul Hawari, Ghazali

    Published 2023
    “…First, a multidimensional geomagnetic feature extraction method is presented which can extract magnetic features from spatial and temporal aspects. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  17. 17

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…These algorithms and methods provide fast and high rate of detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Classification Analysis Of High Frequency Stress Wave For Autonomous Detection Of Defect In Steel Tubes by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yahya, Syed Yusaini

    Published 2014
    “…Interpretation of propagated high frequency stress wave signals in steel tubes is noteworthy for defect identification.This paper demonstrated a successful new approach for autonomous defect detection in steel tubes using classification analysis of high frequency stress waves.Classification analysis using Principal Component Analysis (PCA) algorithm involved feature extraction to reduce the dimensionality of the complex stress waves propagation path.Two defective tubes containing a slot defect of different orientation and a reference tube are inspected using Vibration Impact Acoustic Emission (VIAE) technique.The tubes are externally excited using impact hammer.The variation of stress wave transmission path are captured by high frequency Acoustic Emission sensor.The propagated stress waves in the steel tubes are classified using PCA algorithm.Classification results are graphically illustrated using a dendrogram that demonstrated the arrangement of the natural clusters of the stress wave signals.The inspection of steel tubes showed good recognition of defect in circumferential and longitudinal orientation.This approach successfully classified stress wave signals from VIAE testing and provide fast and accurate defect identification of defective steel tubes from non-defective tubes. …”
    Get full text
    Get full text
    Get full text
    Article