Search Results - (( points detection method algorithm ) OR ( parameter implementation using algorithm ))
Search alternatives:
- parameter implementation »
- implementation using »
- points detection »
- method algorithm »
- using algorithm »
-
1
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
Get full text
Get full text
Conference or Workshop Item -
2
SINR improvement using Firefly Algorithm (FA) for Linear Constrained Minimum Variance (LCMV) beamforming technique
Published 2023Conference Paper -
3
Mobile robot safe navigation in unknown environment
Published 2012“…The resulting path, connecting a start point to a target position where in this method there is no information about the environment. …”
Get full text
Conference or Workshop Item -
4
Implementation of YOLOv8-seg on store products to speed up the scanning process at point of sales
Published 2024“…The small number of data points and the small number of epochs have proven reliable algorithms to implement on store products instead of using QR codes in a digital manner. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory
Published 2015“…State observers are then implemented as the fault detection method in which the discrepancies between the measured values by the sensors and the values of the model are expressed as residuals. …”
Get full text
Get full text
Get full text
Thesis -
6
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
7
Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection
Published 2026“…Second, we employed a pretrained, low-parameter NASNetMobile algorithm that efficiently extracts fine-grained local spatial details. …”
Get full text
Get full text
Article -
8
Detection and evaluation of Caesium-137 point source using silicone photomultiplier sensor
Published 2021“…Back Projection algorithm with Ram-Lak filter is also considered to be the most suitable technique to be applied for this gamma camera in reconstructing the image of a point source gamma emitting radioactive material. …”
Get full text
Get full text
Thesis -
9
Efficient distance computation algorithm between nearly intersected objects using dynamic pivot point in virtual environment application
Published 2014Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
11
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
13
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
Get full text
Get full text
Thesis -
14
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
15
Monitoring water quality in Pusu river using Internet of Things (IoT) and Machine Learning (ML)
Published 2024“…During the first iteration, data were gathered using sensors that measured four parameters: pH, turbidity, temperature, and total dissolved solids (TDS). …”
Get full text
Get full text
Get full text
Article -
16
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
Get full text
Get full text
Monograph -
18
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
20
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article
