Search Results - (( using function method algorithm ) OR ( knowledge detection model algorithm ))
Search alternatives:
- knowledge detection »
- method algorithm »
- function method »
- detection model »
- model algorithm »
- using function »
-
1
Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering
Published 2011“…This is achieved by a pre-estimation using fuzzy clustering that provides a prior knowledge and forms a rough model to be fine tuned using the least square method. …”
Get full text
Get full text
Article -
2
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…Five functional layers are the components of the model architecture. …”
Get full text
Get full text
Article -
3
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. …”
Get full text
Get full text
Thesis -
4
Segmenting the right ventricle cavity from 4D echocardiography images for stroke volume measurement
Published 2014“…By reviewing most of the previous work in the literature, there are different methods used to segment the right ventricle (RV) cavity, such as boundary based detection, texture, and regional segmentation methods. …”
Get full text
Get full text
Thesis -
5
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Existing literature relies on offline trained models or incremental learning models. The former suffers from partially or fully outdated knowledge after drift occurrence, and the latter suffers from the constraints of the pre-defined hyper-parameter of the model. …”
Get full text
Get full text
Thesis -
6
Computed tomography and echocardiography image fusion technique for cardiac images
Published 2016“…Furthermore, integrating virtual models and echocardiographic images will provide a potential means for giving image-guidance for processes which include both functional and anatomical imaging. …”
Get full text
Get full text
Get full text
Thesis -
7
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
8
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
9
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
Published 2024thesis::master thesis -
10
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…Based on the selected features, three predictive modeling techniques (J48, DTNB and Naive Bayes) were applied for dengue outbreak detection. …”
Get full text
Get full text
Get full text
Article -
11
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…This study explains in detail how fuzzy modeling works by using FA for detecting phishing. …”
Get full text
Get full text
Get full text
Article -
12
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
14
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Conference or Workshop Item -
15
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
16
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
17
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
18
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…The results show that the proposed intelligent exoplanet atmospheric retrieval (INARA) algorithm has improved accuracy and is able to detect new attack types efficiently.…”
Get full text
Get full text
Get full text
Article -
19
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
20
Determining the preprocessing clustering algorithm in radial basis function neural network
Published 2008“…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
Get full text
Get full text
Article
