Search Results - (((( pattern based algorithm ) OR ( master research algorithm ))) OR ( pattern using algorithm ))
Search alternatives:
- research algorithm »
- master research »
- using algorithm »
- pattern using »
-
1
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…The performance tests are also conducted to assess whether each algorithm can detect most of the true anomalies. The data is supplied using IoT devices, and benchmark datasets are also presented to test the algorithm's performance.…”
Get full text
Get full text
Thesis -
2
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
4
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
5
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
6
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…Comparison of this framework continue in some of the state-of-the-arts algorithm in the literature and the results is outperformed based on the proposed algorithm experimental result.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement
Published 2013“…The predefined joint trajectories are generated using Matsuoka neural oscillator network as the central pattern generator of the quadruped. …”
Get full text
Get full text
Thesis -
9
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
10
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
Get full text
Get full text
Thesis -
12
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…The repeatability tests shown that the developed navigation algorithm able the robot to reach the target with the similar navigation path pattern outcome in each simulation tests. …”
Get full text
Get full text
Thesis -
13
-
14
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
15
Disparity map algorithm for stereo matching process using local based method
Published 2022“…Hence, this thesis proposes a local-based SVDM algorithm that increases the accuracy on the complex scenes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…The position of the ball screw actuators is controlled by using motion controller based on the inputs received from three force sensors embedded in the insole and an encoder attached at the ankle joint. …”
Get full text
Get full text
Thesis -
17
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…As almost all finger vein recognition algorithms were implemented using software such as MATLAB which is based on general-purpose processor, the processing speed become the bottleneck of the development of finger vein recognition. …”
Get full text
Get full text
Thesis -
18
Image clustering comparison of two color segmentation techniques
Published 2010“…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
20
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
Get full text
Get full text
Get full text
Get full text
Thesis
