Search Results - (( based application method algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…Together with Kernel method (see Silverman, 1986), we improve the process of finding the number of components in GMM. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  10. 10

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Thus, Maio and Maltoni (1997) proposed a method to detect minutiae in gray scale fingerprint images based on ridge line following algorithm, which is to trail the ridge line according to the fingerprint directional image. …”
    Get full text
    Get full text
    Thesis
  12. 12

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim by Mohamad Kasim, Adibah I’zzah

    Published 2025
    “…This study investigates the application of the Levenberg-Marquardt (LM) neural network algorithm for classifying PQDs such as voltage sags, swells, and transients. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A COMBINED HISTOGRAM OF ORIENTED GRADIENTS AND COMPLETED LOCAL BINARY PATTERN METHODS FOR PEOPLE COUNTING IN A DENSE CROWD SCENARIO by PARDIANSYAH, INDRATNO

    Published 2016
    “…This method used a collaborative Histogram of Oriented Gradients (HOG) and Completed Local Binary Pattern (CLBP) based on people detection algorithm to detect headshoulder region. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis