Search alternatives:
detecting algorithm » detection algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
detecting algorithm » detection algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
1
Detecting sleep outside the clinic using wearable heart rate devices
Published 2022“…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …”
-
2
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
3
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
4
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
5
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
Get full text
Get full text
article -
6
-
7
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011Subjects: “…machine learning algorithms, money laundering, financial crime detection,…”
Get full text
-
8
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022Subjects: -
9
-
10
-
11
-
12
Application of Heuristic Algorithms for Multiuser Detection
Published 0000“…In this paper we propose application of heuristic algorithms in multiuser detection (MUD). The proposed algorithm combines a tabu search heuristic algorithm with a local search heuristic algorithm. …”
Get full text
Get full text
article -
13
Unsupervised outlier detection in multidimensional data
Published 2022“…Furthermore, two proposed techniques presented in this paper use transformation of data to a unidimensional distance space to detect the outliers, so irrespective of the data’s high dimensions, the techniques remain computationally inexpensive and feasible. …”
-
14
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…The main novelty of this work is the computer-aided diagnosis scheme for detecting abnormalities in breast ultrasound images by integrating a wavelet neural network (WNN) and the grey wolf optimization (GWO) algorithm. …”
-
15
-
16
Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions
Published 2017“…This paper reviews testing procedures, data analysis, updated algorithms used for joint detection, and discusses the latest round of testing in samples with simulated joints at various angles along the borehole.…”
Get full text
Get full text
Get full text
conferenceObject -
17
Creating and detecting fake reviews of online products
Published 2022“…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. We show that a machine classifier can accomplish this goal near-perfectly, whereas human raters exhibit significantly lower accuracy and agreement than the tested algorithms. …”
-
18
A novel linear time corner detection algorithm
Published 2005“…We have presented a novel scheme for detecting corners of a planner object SRM05. The core of the algorithm is based upon slope analysis. …”
Get full text
Get full text
article -
19
-
20