Search Results - (( set generation method algorithm ) OR ( parameter detection method algorithm ))
Search alternatives:
- parameter detection »
- generation method »
- method algorithm »
- set generation »
-
1
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Thus, an Extremal Region Detection (ERD) algorithm in MSER is improved by finding optimum configuration of MSER parameters, allowing the quantity of interest points for certain food images to be increased appropriately. …”
Get full text
Get full text
Thesis -
2
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
3
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…For volume estimation purpose, a Digital Elevation Models (DEM) were generated from photogrammetric method with flight parameters of three (3) different camera focal length and ten (10) UAV altitude. …”
Get full text
Get full text
Thesis -
4
Federated deep learning for automated detection of diabetic retinopathy
Published 2022“…Deep learning is a machine learning algorithm with potential for detecting the significance of DR. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
6
Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model
Published 2000“…Unlike the residuals, the perturbation method of Cook's distance and the likelihood distance were effective in the detection of observations that have influenced on the parameter estimates. …”
Get full text
Get full text
Thesis -
7
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…Integration of the proposed artefact detection technique into remote monitoring devices could enhance reliability of the PPG-derived physiological parameters.…”
Get full text
Get full text
Article -
8
Vibration analysis for early detection of bearing failures
Published 2024“…The vibration monitoring algorithm utilizes time-domain parameters, frequency domain analysis, and envelope analysis to assess bearing conditions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…The decision lists generated by PART classifier that represent the regularities of the attention and meditation levels among children are converted into several rule sets of positive and negative emotions. …”
Get full text
Get full text
Thesis -
10
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
Get full text
Get full text
Thesis -
11
Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar
Published 2012“…Cross validation is used to find the best parameters related to kernels used followed by training and testing of the data sets. …”
Get full text
Get full text
Thesis -
12
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
13
Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam
Published 2011“…This study verifies the use of the proposed weighting method by Fayyadh and Abdul Razak (2011a) for damage detection algorithms applied on cracked steel beam. …”
Get full text
Get full text
Get full text
Article -
14
SEALiP: A simple and efficient algorithm for listing permutation via starter set method
Published 2013“…Algorithm for listing permutations for n elements is an arduous task.This paper attempts to introduce a novel method for generating permutations.The fundamental concept for this method is to seek a starter set to begin with as an initial set to generate all distinct permutations. …”
Get full text
Get full text
Get full text
Article -
15
Weighting method for modal parameter based damage detection algorithms
Published 2011Get full text
Get full text
Article -
16
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
18
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Comparison between starter sets generation method for listing all permutations
Published 2013“…distinct permutations is an exhaustive process.Using starter set, the process of listing the permutations becomes easy.However a problem arises when the equivalence starter sets will generate the similar permutation and needed to be discarded.Two new recursive strategies are proposed to generate starter sets without generating equivalence starter sets namely circular and exchange two elements operation.Once the starter sets are obtained, the circular and reverse of circular operation are employed to produce distinct permutation from each starter sets.Computational advantages are presented comparing the results obtained by the new method with two other existing methods.The result indicates that the exchange two elements based strategy is faster than the circular based.Overall all new algorithms are better than existing algorithms in time execution.…”
Get full text
Get full text
Conference or Workshop Item -
20
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis
