Search Results - (( data extraction utilizing algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- extraction utilizing »
- parameter detection »
- method algorithm »
-
1
Development of hippocampus MRI image segmentation algorithm for progression detection of alzheimer’s disease (AD)
Published 2022“…The active contour method (Chan-Vese) was utilized to extract the ROI parameters (hippocampus). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…Non detection zone decreases to around zero and the proposed method has the ability to detect islanding up to 0.1% power mismatch. …”
Get full text
Get full text
Thesis -
3
Edge detection of MRI images using artificial neural network
Published 2017“…Discussion The proposed ANN based edge detection produce better image segmentation for MRI images compared to other traditional edge detection algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Translating conventional wisdom on chicken comb color into automated monitoring of disease-infected chicken using chromaticity-based machine learning models
Published 2024“…These works have shown that, despite using only the optical chromaticity of the chicken comb as the input data, the developed models (95% accuracy) have performed exceptionally well, compared to other reported results (99.469% accuracy) which utilize more sophisticated input data such as morphological and mobility features. …”
Article -
5
-
6
Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection
Published 2026“…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
Get full text
Get full text
Article -
7
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…Cross validation is used to find the best parameters related to kernels used followed by training and testing of the data sets. …”
Get full text
Get full text
Thesis -
8
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
9
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
10
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
11
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
13
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
15
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
Get full text
Get full text
Get full text
Article -
16
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
17
Near-infrared technique for oil palm fruit grading system
Published 2013“…The grading systems in general utilized improved engineering designs with image processing techniques to ensure the quality of the product.In this research, a hyperspectral oil palm grading system was built and an image processing techniques algorithm was developed based on the spectral reflectance of the external features of oil palm fresh fruit bunches (FFB). …”
Get full text
Get full text
Thesis -
18
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
Get full text
Get full text
Student Project -
19
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm
Published 2018“…At the early stage of this disease, infected palms are symptomless, which imposes difficulties in detecting the disease. In spite of the availability of tissue and DNA sampling techniques, there is a particular need for replacing costly field data collection methods for detecting Ganoderma in its early stage. …”
Get full text
Get full text
Get full text
Thesis
