Search Results - (( discrete detection method algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…Ant colony optimization has been inspired by the action of the actual ant colony and is used to solve discrete optimization issues. …”
    Get full text
    Get full text
    Student Project
  5. 5
  6. 6

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Sleep arousal events detection using PNN-GBMO classifier based on EEG and ECG signals: A hybrid-learning model by Afsoon Badiei, Saeed Meshgini, Ali Farzamnia

    Published 2020
    “…Features can be extracted by three fractal descriptors, Lyapunov exponent and cumulatively discrete wavelet transform. A subset of the features is then applied into the probabilistic neural network optimized by Gases Brownian Motion Optimization (GBMO) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Fault Detection using Dynamic Parity Space Approach by Mohamed Basri, H., Lias, K., Wan Zainal Abidin, W.A, Tay, Kai Meng, Hushairi, Zen

    Published 2012
    “…Then, technological advances which require complex computation such as artificial intelligence and genetic algorithm had made tremendous improvement to fault Detection and Isolation (FDI) analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The first layer is used to detect up to superfamily and family in SCOP hierarchy, by using optimized binary SVM classification rules directly to ROC-Area. …”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2017
    “…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Book Chapter
  17. 17

    Detection of micro emboli using signal energy and discrete fourier transform / Basil Mathew Panamkuttiyil by Basil Mathew , Panamkuttiyil

    Published 2011
    “…The designed algorithm was able to detect presence of emboli with considerable accuracy. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Wavelet based fault tolerant control of induction motor / Khalaf Salloum Gaeid by Gaeid, Khalaf Salloum

    Published 2012
    “…The fault detection algorithm identifies the time and location of each fault. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing by Barakat, Hussein Mohammed

    Published 2016
    “…This thesis focuses on the Bartlett periodogram method using the discrete cosine transform (DCT) instead of previous methods which used the discrete Fourier transform (DFT) to get the power spectrum density that is used to detect the primary user by comparing with the predefined threshold. …”
    Get full text
    Get full text
    Thesis