Search Results - (( form detection method algorithm ) OR ( using function method algorithm ))
Search alternatives:
- method algorithm »
- function method »
- form detection »
- using function »
-
1
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
2
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
Published 2016“…GA is used as the method of unlawful behavior detection. …”
Get full text
Get full text
Thesis -
3
Web Camera Application For Motion Detection
Published 2003“…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
4
-
5
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Model verification of all method and model proposed in this study are examined using the simulation study. …”
Get full text
Get full text
Thesis -
7
MRI brain tumor detection methods using contourlet transform based on time adaptive self-organizing map
Published 2023“…In this article, we propose a novel method that uses contourlet transform and time adaptive self-organizing map, optimized by the whale optimization algorithm, in order to distinguish between benign and malignant brain tumors in MRI images. …”
Get full text
Get full text
Get full text
Article -
8
Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering
Published 2011“…This is achieved by a pre-estimation using fuzzy clustering that provides a prior knowledge and forms a rough model to be fine tuned using the least square method. …”
Get full text
Get full text
Article -
9
Structural steel plate damage detection using DFT spectral energy and artificial neural network
Published 2011Get full text
Working Paper -
10
Face emotion recognition using artificial intelligence techniques
Published 2008“…The acquired images have gone through few preprocessing methods. The edge detection has to be successful even when the intensity of light is uneven. …”
Get full text
Thesis -
11
Outlier Detections and Robust Estimation Methods for Nonlinear Regression Model Having Autocorrelated and Heteroscedastic Errors
Published 2010“…Finally, we proposed statistics practitioners to use the formal modeling algorithms to get better inferences. …”
Get full text
Get full text
Thesis -
12
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…We conducted a systematic review aimed at determining the diagnostic power of rs-fMRI to identify FC abnormalities in the DMN of patients with AD or MCI compared with healthy controls (HCs) using machine learning (ML) methods. Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
Get full text
Get full text
Get full text
Article -
13
A preliminary study on automated freshwater algae recognition and classification system / Hayat Mansoor Abdullah
Published 2012“…Then, Image segmentation applied by using canny edge detection algorithm with specific morphological operation to isolate the image objects components. …”
Get full text
Get full text
Thesis -
14
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
Get full text
Learning Object -
15
-
16
Personal identification by Keystroke Pattern for login security
Published 2001“…Several other factors such as momentum, learning rate and various weight initialization were used for comparison. Three types of weight initialization were used, including Nguyen-Widrow (NW), Random and Genetic Algorithm (GA). …”
Get full text
Get full text
Thesis -
17
Smart student timetable planner
Published 2025“…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
Get full text
Get full text
Get full text
Thesis -
19
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
20
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
Published 2023“…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
Get full text
Get full text
Get full text
Article
