Search Results - (( rate evaluation system algorithm ) OR ( frames extraction path algorithm ))
Search alternatives:
- evaluation system »
- frames extraction »
- system algorithm »
- rate evaluation »
- extraction path »
- path algorithm »
-
1
Local DTW coefficients and pitch feature for back-propagation NN digits recognition
Published 2006“…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
Get full text
Conference or Workshop Item -
2
Local DTW Coefficients and Pitch Feature for Back-Propagation NN Digits Recognition
Published 2006“…The LPC features vectors are aligned between the source frames to the template using our DTW frame fixing (DTW-FF) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
NN with DTW-FF Coefficients and Pitch Feature for Speaker Recognition
Published 2006“…This paper proposes a new method to extract speech features in a warping path using dynamic programming (DP). …”
Get full text
Get full text
Article -
4
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…The proposed algorithm can effectively overcome load balancing problems and increase execution success rates in distributed systems that are prone to faults.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing
Published 2015“…However, the rate remains unchanged during the algorithm iterations, which makes the algorithm either bias toward exploitation or exploration.Hence, this study proposes a strategic oscillation rate to control the exploitation and exploration in ant colony system.The proposed algorithm was evaluated with job scheduling problem benchmarks on grid computing.Experimental results show that the proposed algorithm outperforms other metaheuristics algorithms in terms of makespan and flowtime. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility
Published 2018“…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The simulation results showed that the Decision Tree Algorithm achieved the highest precision rate by 95.5% within 42 seconds. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…In order to measure the evaluation, several performance metrics, such as frequency of convergence of the detection scheme, accuracy of detection, false alarm rate, defence rate and energy consumption, are addressed as part of detection and prevention scheme. …”
Get full text
Get full text
Thesis -
9
Slam-based mapping for object recognition
Published 2018“…The SIFT (Scale-Invariant Feature Transform) is used to extract features from the current frame and match with the object database to identify and recognize the object whenever the robot come across the object. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
11
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
12
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Both enhancements were evaluated in terms of accuracy, false positive alarm and detection rate against state-of-the-practice dataset (KDD Cup 99 dataset) in IDS application. …”
Get full text
Get full text
Thesis -
13
Object tracing from synthetic fluid spray through instance segmentation
Published 2024“…The resulting objects were then analyzed using a customized nearest neighbor algorithm to calculate their correspondence between frames and a BFS algorithm was used to trace their movement path. …”
Get full text
Get full text
Thesis -
14
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…To evaluate the performance of the proposed method, the proposed method is realized and evaluated on the benchmark NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
An enhanced metaheuristic approach to solve quadratic assignment problem using hybrid technique
Published 2021“…The valuate of performance HDDETS algorithm comparison to existing hybrid-based algorithms, namely: Biogeography-Based Optimization Tabu Search (BBOTS), Whale Algorithm with Tabu Search (WAITS), Hybrid Ant System (HAS), Lexisearch and Genetic Algorithms (LSGA), and Golden Ball Simulated Annealing (GBSA) algorithms. …”
Get full text
Get full text
Get full text
Thesis -
16
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…Human auditory system has been successfully employed in speech compression to reduce bit rate requirement. …”
Get full text
Get full text
Get full text
Article -
17
Application of multithreading technique for multiple input and multiple output mechatronic system
Published 2017“…In this paper, multithreading technique is being applied in the system algorithm and evaluated for real-time color marker based navigation system for image guide surgery. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…The evaluation found that FA2 algorithm when combined with MC algorithm produce the best network representation for SAGA. …”
Get full text
Get full text
Get full text
Thesis -
19
Travel place recommendation system using K-Nearest Neighbors algorithm / Nur Amirah Shahidan
Published 2021“…The algorithm used in the recommendation system has been evaluated by using MAE, MSE and RMSE to calculate the accuracy of the algorithm. …”
Get full text
Get full text
Thesis -
20
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis
