Search Results - (( solution detection method algorithm ) OR ( based application method algorithm ))

Refine Results
  1. 1

    Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif by Abdalla Osama , Hamdan Abdellatif

    Published 2024
    “…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…Several studies have provided solutions for detecting vegetation encroachment based on satellite images. …”
    text::Thesis
  8. 8

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO by MAHABADI, SEYED ALI KASAEIZADEH MAHABADI

    Published 2010
    “…Correspondence is the method of detecting the real world object reflections in two camera views. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…In solving this issue, this paper presents an Automated Threshold Detection Algorithm, H(•). The algorithm is applied in segmenting human lower limbs from a series of image frames of human walking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  13. 13

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. The approach aims to offer a solution to protect users from potential threats such as Banking Trojan malware. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…Thus, in this paper, a balance between detection accuracy and speed for SBD is addressed by presenting a new method for fast video processing. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    SMART: a subspace based malicious peers detection algorithm for P2P systems by Wei, Xianglin, Fan, Jianhua, Chen, Ming, Ahmed, Tarem, Pathan, Al-Sakib Khan

    Published 2013
    “…Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. SMART first reconstructs the original reputation matrix based on subspace method, and then finds malicious peers out based on Shewhart control chart. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…The present method has proven its precise performance in RNP of large-scale area based on real-time railway monitoring tasks.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis