Search Results - (( probable evaluation methods algorithm ) OR ( probable detection method algorithm ))
Search alternatives:
- probable evaluation »
- evaluation methods »
- probable detection »
- methods algorithm »
- method algorithm »
-
1
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
Get full text
Get full text
Monograph -
2
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…Thus, a 5G-MIMO based CR communication system has been developed to enhance the spectrum by employing a spectrum sensing (SS) algorithm. This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
Get full text
Get full text
Article -
3
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
4
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Since EC, like genetic algorithm, relies on randomness and probabilities, it is cumbersome when constraints are present in the search. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
GENETIC FUZZY FILTER BASED ON MAD AND ROAD TO REMOVE MIXED IMPULSE NOISE
Published 2010“…The GA training aims to find the best parameters for the fuzzy sets in the fuzzy noise detection. From the experimental results, the proposed method has successfully removed mixed impulse noise in low to medium probabilities, while keeping the uncorrupted pixels less affected by the median filtering. …”
Get full text
Get full text
Thesis -
8
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
Get full text
Get full text
Thesis -
9
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. …”
Get full text
Get full text
Thesis -
10
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
11
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation
Published 2007“…If all codes are already utilized then the user will be blocked. Finally, the probability of blocking was evaluated in terms of various numbers of available codes. …”
Get full text
Get full text
Thesis -
13
-
14
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Both subjective and objective evaluation show that the proposed scheme is not only superior to the commonly used energy detection method but also to various multi-resolution sensing techniques as it relies on the robustness of cyclostationary feature detection. …”
Get full text
Get full text
Thesis -
15
Robust Kernel Density Function Estimation
Published 2010“…The simulation study demonstrates that, on the whole, the accuracy of the proposed method is better than the competitor methods. The research also develops two new approaches for outlier and potential outlier detection in unimodal and multimodal distributions. …”
Get full text
Get full text
Thesis -
16
Human tracking in video surveillance using particle filter
Published 2016“…The technique performed excellently well when evaluated on the publicly available CAVIAR dataset and outperformed the Kalman filter algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Structural crack detection using deep convolutional neural network / Raza Ali
Published 2022“…Thanks to the advancement in hardware, data collection procedures, and efficient algorithms. These innovations have changed the way how specific problems are solved as compared to conventional methods. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of brain tumor segmentation of magnetic resonance imaging (MRI) using u-net deep learning
Published 2023“…Numerous kinds of brain tumors were discovered, which need accurate and early detection techniques. Currently, most diagnosis and detection methods rely on the decision of neuro-specialists and radiologists to evaluate brain images, which may be timeconsuming and cause human errors. …”
Article -
19
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
