Search results

Results 1 – 20 of 1,845
Advanced search

Search in namespaces:

There is a page named "Component Detection Algorithm" on Wikipedia

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • The component detection algorithm (CODA) is a name for a type of LC-MS and chemometrics software algorithm focused on detecting peaks in noisy chromatograms...
    2 KB (182 words) - 01:08, 18 August 2022
  • Thumbnail for Leiden algorithm
    The Leiden algorithm is a community detection algorithm developed by Traag et al at Leiden University. It was developed as a modification of the Louvain...
    7 KB (1,199 words) - 01:41, 16 May 2024
  • primarily by the problem of face detection, although it can be adapted to the detection of other object classes. The algorithm is efficient for its time, able...
    19 KB (2,778 words) - 04:23, 29 April 2024
  • a system used at Jefferson Lab in the United States Component detection algorithm, an algorithm in mass spectrometry CODA (company), financial software...
    4 KB (488 words) - 17:39, 2 February 2024
  • algorithmic application of graph theory, where subsets of connected components are uniquely labeled based on a given heuristic. Connected-component labeling...
    27 KB (3,192 words) - 07:37, 27 December 2023
  • Thumbnail for Strongly connected component
    off the stack into a new component. The path-based strong component algorithm uses a depth-first search, like Tarjan's algorithm, but with two stacks. One...
    13 KB (1,639 words) - 16:09, 29 June 2024
  • priori before the algorithm is run. Well-known algorithms for ICA include infomax, FastICA, JADE, and kernel-independent component analysis, among others...
    43 KB (6,636 words) - 00:32, 30 June 2024
  • Thumbnail for Canny edge detector
    The Canny edge detector is an edge detection operator that uses a multi-stage algorithm to detect a wide range of edges in images. It was developed by...
    24 KB (3,355 words) - 07:21, 14 June 2024
  • computational physics. Collision detection is a classic problem of computational geometry. Collision detection algorithms can be divided into operating on...
    31 KB (4,682 words) - 23:40, 13 July 2024
  • Thumbnail for Random early detection
    congestion avoidance. In the conventional tail drop algorithm, a router or other network component buffers as many packets as it can, and simply drops...
    8 KB (846 words) - 10:24, 30 December 2023
  • Thumbnail for Tornado vortex signature
    National Weather Service (NWS) now uses an updated algorithm developed by NSSL, the tornado detection algorithm (TDA) based on data from its WSR-88D system of...
    7 KB (717 words) - 06:46, 24 May 2024
  • Thumbnail for Principal component analysis
    correspondence analysis Directional component analysis Dynamic mode decomposition Eigenface Expectation–maximization algorithm Exploratory factor analysis (Wikiversity)...
    114 KB (14,283 words) - 16:49, 3 July 2024
  • k-means clustering k-medians Mean-shift OPTICS algorithm Anomaly detection k-nearest neighbors algorithm (k-NN) Local outlier factor Semi-supervised learning...
    41 KB (3,580 words) - 16:15, 14 June 2024
  • The algorithm was first described by Gerald Goertzel in 1958. Like the DFT, the Goertzel algorithm analyses one selectable frequency component from a...
    19 KB (2,522 words) - 07:42, 2 March 2024
  • Strongly connected components Path-based strong component algorithm Kosaraju's algorithm Tarjan's strongly connected components algorithm Subgraph isomorphism...
    71 KB (7,800 words) - 14:52, 28 June 2024
  • Relational Motion Detection www.cs.rochester.edu/~nelson/research Motion Detection Algorithms In Image Processing Motion Detection and Recognition Research...
    5 KB (550 words) - 09:46, 4 February 2024
  • In data analysis, anomaly detection (also referred to as outlier detection and sometimes as novelty detection) is generally understood to be the identification...
    38 KB (4,018 words) - 12:29, 13 June 2024
  • security include: Low probability of interception (LPI) Low probability of detection (LPD) Antijam — resistance to jamming (EPM or ECCM) Methods used to achieve...
    991 bytes (105 words) - 12:51, 15 February 2016
  • multiple learning algorithms to obtain better predictive performance than could be obtained from any of the constituent learning algorithms alone. Unlike...
    52 KB (6,606 words) - 16:42, 12 July 2024
  • rule-based machine learning algorithms that combine a discovery component, typically a genetic algorithm, with a learning component, performing either supervised...
    134 KB (14,772 words) - 03:33, 8 July 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)