Search alternatives:
element » elements (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
element » elements (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…The slime mould algorithm (SMA) gives good results in finding the best solutions to optimization problems. …”
Get full text
-
2
-
3
-
4
-
5
-
6
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
7
-
8
-
9
AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques
Published 2023“…This paper proposes a novel automated algorithm for the health monitoring of concrete column base cover degradation based on IoT and the state-of-the-art deep learning framework, Convolutional Neural Network (CNN). …”
Get full text
Get full text
Get full text
article -
10
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
Published 2022“…This is addressed such that the genetic algorithm (GA) technique is used for selecting the best features and the artificial neural network (ANN) classifier is applied for fault diagnosis. …”
-
11
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…In this paper, we propose two models for intrusion detection and classification scheme Trust-based Intrusion Detection and Classification System (TIDCS) and Trust-based Intrusion Detection and Classification System- Accelerated (TIDCS-A) for secure network. …”
-
12
A novel linear time corner detection algorithm
Published 2005“…We have presented a novel scheme for detecting corners of a planner object SRM05. The core of the algorithm is based upon slope analysis. …”
Get full text
Get full text
article -
13
-
14
-
15
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
Published 2022“…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
-
16
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
17
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 1%. …”
Get full text
Get full text
article -
18
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022“…<p>In this paper, special attention is paid to the detection and diagnosis of various incipient faults of uncertain wind energy conversion (WEC) systems. …”
-
19
-
20
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis