Search Results - (( using detection method algorithm ) OR ( parameter implementation using algorithm ))
Search alternatives:
- parameter implementation »
- implementation using »
- method algorithm »
- using detection »
- using algorithm »
-
1
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…The expectation maximization algorithm is used to estimate the parameter of the model such that the initial values of the algorithm is determined using the kernel method. …”
Get full text
Get full text
Conference or Workshop Item -
2
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A pothole boundary detection algorithm using image segmentation technique in urban road
Published 2025“…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Article -
5
Novel chewing cycle approach for peak detection algorithm of chew count estimation
Published 2025“…This work proposes a novel approach to chew count estimation using particle swarm optimization (PSO) combined with a peak detection algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
7
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
8
Autism Spectrum Disorder Classification Using Deep Learning
Published 2021“…The image data is pre-processed; the CNN algorithm is then applied to classify the ASD and non-ASD, and the steps of implementing the CNN algorithm are clearly stated. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The implementation of the K-Means Clustering algorithm for detecting the level of spread of COVID-19 data in Indonesia by using the parameter k=3 is quite good with areas in Indonesia that have a high the spread of COVID-19 and the results of the cluster validity test get silhouette values on O = (Total Case, Total Death) and P = (Total Case, Total Death, Total Recovered) have the same cluster value, which is 0.93 which means the cluster quality is very good.…”
Get full text
Get full text
Book Section -
10
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…Machine learning approaches have been widely used to increase the effectiveness of intrusion detection platforms. …”
Get full text
Get full text
Thesis -
12
Voltage Variation Analysis By Using Gabor Transform
Published 2019“…The voltage variation signals are successfully detected by using the K-Nearest Neighbors (kNN) algorithm with the implementation of signal parameters extracted as the input on the classifier. …”
Get full text
Get full text
Get full text
Article -
13
Design and analysis of high performance matrix filling for DNA sequence alignment accelerator using ASIC design flow / Nurzaima Mahmod
Published 2010“…This method provides magnificent speed up over than traditional sequential implementation methods while it sensitivity detection is still remained. …”
Get full text
Get full text
Thesis -
14
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…Hence, the main objective of this research is to address the feasibility and demonstrate the potential of DM in SHM, as well as apply DM technology which includes machine learning, artificial intelligence and statistical methods for damage detection of a lab-scale slab-on-girder bridge and four steel I beams structures using dynamic parameters of structures. …”
Get full text
Get full text
Get full text
Thesis -
15
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…The information gathered is useful for Authorities, concession expressway company and interest party for better road maintenance implementation.…”
Get full text
Get full text
Thesis -
16
Observer-based fault detection approach using fuzzy adaptive poles placement system with real-time implementation
Published 2021“…This paper validated the system simulation by implementing fault detection algorithms by using a real-time embedded observer-based system. …”
Get full text
Get full text
Article -
17
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…The algorithm also utilizes certain statistical features from the EEG signal that are used as features to the classifier logic. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani
Published 2005“…This project is all about implementing the back-propagation neural network algorithm in classification of face expression. …”
Get full text
Get full text
Thesis -
20
Mobile robot safe navigation in unknown environment
Published 2012“…Due to its ability and effortlessness for real-time implementation, fuzzy controller has been used for the proposed navigation strategy. …”
Get full text
Conference or Workshop Item
