Search Results - (( data detection method algorithm ) OR ( parallel visualization based algorithm ))*
Search alternatives:
- visualization based »
- method algorithm »
- data detection »
-
1
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
High performance visualization of human tumor growth software
Published 2008“…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
The visualization of three dimensional brain tumors' growth on distributed parallel computer systems
Published 2009“…The main objective of this study is to visualize the brain tumors’ growth in three-dimensional and implement the algorithm on distributed parallel computer systems. …”
Get full text
Get full text
Article -
4
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009“…These courses will actively engage the students in exploring the concepts of the development the parallel algorithm in visualizing the grand challenge applications of mathematical problems. …”
Get full text
Get full text
Conference or Workshop Item -
6
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
7
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…The parallel algorithm for the simulation of human tumor growth is a new invention at the present time. …”
Get full text
Get full text
Get full text
Get full text
Book -
8
Image based autonomous indoor parallel parking assist on omni-directional vehicle (ODV)
Published 2016Get full text
Get full text
Undergraduates Project Papers -
9
Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt
Published 2020“…Therefore, the execution time of the image processing algorithm is also an essential aspect of quality. This manuscript proposes a parallel k means for image processing (PKIP) algorithm using multiprocessing and distributed computing to assess the adhesion failure in WMA and HMA samples subjected to three different moisture sensitivity tests (dry, one, and three freeze-thaw cycles) and fractured by indirect tensile test. …”
Get full text
Get full text
Article -
10
Parallel batch self-organizing map on graphics processing unit using CUDA
Published 2018“…The most computationally expensive parts of its training algorithm (such as steps to compute distance between each data vector and neuron, and determining the Best Matching Unit based on minimum distance) are identified and mapped on GPU to be processed in parallel. …”
Get full text
Get full text
Article -
11
Parallel batch self-organizing map on graphics processing unit using CUDA
Published 2018“…The most computationally expensive parts of its training algorithm (such as steps to compute distance between each data vector and neuron, and determining the Best Matching Unit based on minimum distance) are identified and mapped on GPU to be processed in parallel. …”
Get full text
Get full text
Article -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
13
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…A highly parallel approach based on simple inter-map conjunctions, or correspondence distributions, is chosen and tested on synthetic and real patterns. …”
Get full text
Get full text
Thesis -
14
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
17
Drone Based Image Processing For Precision Agriculture
Published 2019“…At first, the parallel K-means clustering algorithm was applied on the acquired image to segregate various components acquired using UAV. …”
Get full text
Get full text
Monograph -
18
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
19
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
20
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis
