Search Results - (((("pattern matching algorithm") OR ("pattern using algorithm"))) OR ("_ learning algorithm"))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm by Jaber M.M., Yussof S., Elameer A.S., Weng L.Y., Abd S.K., Nayyar A.

    Published 2023
    “…Automation; Complex networks; Computational complexity; Deep learning; Image analysis; Medical imaging; Pattern matching; Pixels; Distribution pattern-matching rule; Distribution patterns; Gray wolf-optimized deep convolution network; Gray wolves; Learning patterns; Matching rules; Medical fields; Medical image analysis; Pattern matching algorithms; Pattern-matching; Convolution…”
    Article
  5. 5

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Pattern matching for automatic sign language translation system using LabVIEW by Domingo, Andreas, Akmeliawati, Rini, Kuang, Ye Chow

    Published 2007
    “…This paper presents an automatic sign language translator, which is able to translate Malaysian sign language using pattern-matching algorithm. The sign language translator is a vision-based system where the image of the sign is captured by a camera, processed and translated into English by the computer. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…Then, the outcomes demonstrated that the best classifier for categorizing our data with 0.96% accuracy is the Decision Tree machine learning algorithm. When comparing the accuracy of a malware detection model, it is excellent if there are numerous machine learning algorithms and more malware datasets included.…”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    A new split based searching for exact pattern matching for natural texts by Hakak, Saqib Iqbal, Kamsin, Amirrudin, Shivakumara, Palaiahnakote, Idris, Mohd Yamani Idna, Gilkar, Gulshan Amin

    Published 2018
    “…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
    Get full text
    Get full text
    Article
  12. 12

    Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode. by Tan , Beng Ghee

    Published 2016
    “…A Bloom Filter pattern matching algorithm with fast hashing functions is developed for 32-bit and 64-bit computer system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works by Gorment N.Z., Selamat A., Krejcar O.

    Published 2023
    “…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
    Conference Paper
  14. 14

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…The scope of this study is tri folded, First, an exhaustive and parametric comparative study on a wide variety of machine learning algorithms is presented to evaluate the performance of machine learning algorithms in energy load prediction. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
    Get full text
    Get full text
    Article
  16. 16

    Functional link neural network with modified bee-firefly learning algorithm for classification task by Mohmad Hassim, Yana Mazwin

    Published 2016
    “…The single layer property of FLNN also make the learning algorithm used less complicated compared to MLP network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An iterative incremental learning algorithm for complex-valued hopfield associative memory by Masuyama, N., Chu, K.L.

    Published 2016
    “…From the result of simulation experiment in terms of memory capacity and noise tolerance, the proposed model has the superior ability than the model with a complexvalued pseudo inverse learning algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error as compared to a model with single learning algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error compare to a model with single learning algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network by Rahim, Muhammad Fitri

    Published 2012
    “…Based on result obtained, it shows that IWO learning algorithm is capable to produce accurate prediction load demand. …”
    Get full text
    Get full text
    Student Project