Search Results - (( features detection method algorithm ) OR ( parameter estimation using algorithm ))
Search alternatives:
- features detection »
- method algorithm »
- using algorithm »
- parameter »
-
1
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
3
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…The study set four main objectives to achieve its aim: (1) To analyse RGB and multispectral sensor calibration, (2) To evaluate the optimal flight parameters for pothole modelling production using RGB imagery, (3) To investigate various classifier algorithms and band combinations for pothole region areas using multispectral imagery and (4) To validate geometric information from the extracted pothole. …”
Get full text
Get full text
Thesis -
5
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…Facial feature detection must first be performed before any of the face recognition methods can be applied. …”
Get full text
Get full text
Thesis -
6
Signal quality measures for pulse oximetry through waveform morphology analysis
Published 2011“…Pulse oximetry has been extensively used to estimate oxygen saturation in blood, a vital physiological parameter commonly used when monitoring a subject’s health status. …”
Get full text
Get full text
Get full text
Article -
7
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
8
An efficient method for detecting covered face scenarios in ATM surveillance camera
Published 2020“…Furthermore, processing time of the proposed algorithm is significantly improved while it is compared to the existing methods. …”
Get full text
Get full text
Get full text
Article -
9
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
Get full text
Get full text
Get full text
Thesis -
10
Processing and classification of landsat and sentinel images for oil palm plantation detection
Published 2022“…It first focuses on the correction algorithm needed to estimate the true surface reflectance value of the satellite image data before the image is filtered to reduce any noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
12
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…To address this problem, this research presents a fake news detection method that combines different features and developing methods for the most crucial phases in the detection process, including feature extraction, feature selection and fake news detection phases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
14
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
15
-
16
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
17
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
18
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
20
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article
