Search Results - (( using optimization method algorithm ) OR ( pattern detection schemes algorithm ))
Search alternatives:
- pattern detection »
- detection schemes »
- schemes algorithm »
- method algorithm »
-
1
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
2
-
3
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…For this purpose, this study used the intensification and diversification properties of the recently proposed moth-flame optimisation (MFO) algorithm and utilised the algorithm in the proposed feature selection scheme. …”
Get full text
Get full text
Get full text
Article -
4
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
Get full text
Get full text
Monograph -
5
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
6
A Distributed Event Detection Scheme for Wireless Sensor Networks
Published 2009“…We propose a low-computation, distributed, and lightweight event detection scheme in wireless sensor networks, which is adopted from the pattern recognition scheme known as Distributed Hierarchical Graph Neuron. …”
Get full text
Get full text
Conference or Workshop Item -
7
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
Published 2013“…This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. …”
Get full text
Get full text
Conference or Workshop Item -
8
Model predictive control based on Lyapunov function and near state vector selection of four-leg inverter / Abdul Mannan Dadu
Published 2018“…The position of reference currents is used to detect the voltage vectors surrounding the reference voltage vector in every sampling period. …”
Get full text
Get full text
Get full text
Thesis -
9
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
10
Anomaly detection through spatio-temporal context modeling in crowded scenes
Published 2014“…By combining the determinations from the two stages, a weighted scheme is proposed to automatically detect anomaly events from crowded scenes. …”
Get full text
Get full text
Conference or Workshop Item -
11
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
12
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…In this paper we present three software-based agents built using kernel machines to perform automated, real-time intruder detection in surveillance systems. Kernel machines provide a powerful data mining technique that may be used for pattern matching in the presence of complex data. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Handwriting Recognition Using Artificial Neural Network
Published 2004“…This network is trained using the Back-Propagation algorithm to identify similarities and patterns among different handwriting samples. …”
Get full text
Get full text
Final Year Project -
15
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
16
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The first step is devoted to detecting invisible patches. Further, an efficient color contrast scheme is proposed. …”
Get full text
Get full text
Thesis -
17
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
18
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item -
19
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article -
20
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…Two methods of optimization are used for CBLL. They are Cross Entropy and also Genetic Algorithm. …”
Get full text
Get full text
Thesis
