Search Results - (( data detection using algorithm ) OR ( parallel extraction method algorithm ))*
Search alternatives:
- parallel extraction »
- extraction method »
- method algorithm »
- using algorithm »
- data detection »
-
1
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Real-time Rotation Invariant Hand Tracking Using 3D Data
Published 2014“…This paper proposes hand tracking method using hand tracker algorithm released by NiTE, hand’s segmentation method, hand contour detection and center of palm detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
4
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
Get full text
Get full text
Thesis -
5
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…To conclude, multi objective parallel genetic algorithm can automatically tune feed forward neural network to classify the dataset with a good classification rate.…”
Get full text
Get full text
Thesis -
6
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
7
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
Published 2019“…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. …”
Get full text
Get full text
Thesis -
8
Robust partitioning and indexing for iris biometric database based on local features
Published 2018“…The proposed method combines three transformation methods DCT, DWT and SVD to analyse iris images and extract their local features. …”
Get full text
Get full text
Get full text
Article -
9
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…We used data set from 1999 KDD intrusion detection contest.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Combining deep and handcrafted image features for MRI brain scan classification
Published 2019“…In parallel, handcrafted features are extracted using the modified gray level co-occurrence matrix (MGLCM) method. …”
Get full text
Get full text
Get full text
Article -
12
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
13
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Clustering algorithms can be used to create an outlier detection procedure in univariate circular data. …”
Get full text
Get full text
Get full text
Article -
17
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
18
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…This approach that is according to the DNN model reduces irrelevant features in the intrusion detection data sets of CICIDS2017 to improve the accuracy and cluster high-scale data sets. …”
Get full text
Get full text
Thesis
