Search Results - (( discrete detection method algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- discrete detection »
- method algorithm »
-
1
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article -
2
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
Get full text
Get full text
Thesis -
3
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
4
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…Ant colony optimization has been inspired by the action of the actual ant colony and is used to solve discrete optimization issues. …”
Get full text
Get full text
Student Project -
5
Methods for identification of the opportunistic gut mycobiome from colorectal adenocarcinoma biopsy tissues
Published 2024“…•Detailed method to identify the gut mycobiome in colorectal cancer patients using ITS-specific amplicon sequencing. …”
Get full text
Get full text
Get full text
Article -
6
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
Get full text
Get full text
Thesis -
7
-
8
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
9
Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model
Published 2020“…Features can be extracted by three fractal descriptors, Lyapunov exponent and cumulatively discrete wavelet transform. A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Fault Detection using Dynamic Parity Space Approach
Published 2012“…Then, technological advances which require complex computation such as artificial intelligence and genetic algorithm had made tremendous improvement to fault Detection and Isolation (FDI) analysis. …”
Get full text
Get full text
Get full text
Article -
11
-
12
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The first layer is used to detect up to superfamily and family in SCOP hierarchy, by using optimized binary SVM classification rules directly to ROC-Area. …”
Get full text
Get full text
Monograph -
13
-
14
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Get full text
Article -
15
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
Published 2016“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Book Chapter -
17
Detection of micro emboli using signal energy and discrete fourier transform / Basil Mathew Panamkuttiyil
Published 2011“…The designed algorithm was able to detect presence of emboli with considerable accuracy. …”
Get full text
Get full text
Thesis -
18
-
19
Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid
Published 2012“…The fault detection algorithm identifies the time and location of each fault. …”
Get full text
Get full text
Thesis -
20
A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing
Published 2016“…This thesis focuses on the Bartlett periodogram method using the discrete cosine transform (DCT) instead of previous methods which used the discrete Fourier transform (DFT) to get the power spectrum density that is used to detect the primary user by comparing with the predefined threshold. …”
Get full text
Get full text
Thesis
