Search Results - (( based constructive method algorithm ) OR ( pattern detection a algorithm ))
Search alternatives:
- based constructive »
- pattern detection »
- method algorithm »
- detection a »
- a algorithm »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
2
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
3
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…Rotating machinery—a crucial component in modern industry, requires vigilant monitoring such that any potential malfunction of its electromechanical systems can be detected prior to a fatal breakdown. …”
Get full text
Get full text
Get full text
Article -
4
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
5
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
6
Automatic recognition of freshwater algae (Oscillatoria sp.) using image processing techniques with artificial neural network approach / Awatef Saad Salem Saad
Published 2012“…Computer-based image analysis and pattern recognition methods were used to construct a system that is able to identify, and classify selected Cyanobacteria genus automatically. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Mean of correlation method for optimization of affective states detection in children
Published 2018“…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
9
-
10
An algorithm for Elliott Waves pattern detection
Published 2018“…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
Get full text
Get full text
Article -
11
An algorithm for Elliott Waves pattern detection
Published 2018“…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
Get full text
Get full text
Article -
12
An adaptive face recognition under constrained environment for smartphone database
Published 2018“…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
Get full text
Get full text
Thesis -
13
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
Get full text
Get full text
Monograph -
14
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification
Published 2019“…However, the EMG signal pattern classification was done by SVM has better performance than LDA due to less significant difference in the accuracy percentage, and a fewer number of sensors used by the SVM. …”
Get full text
Get full text
Thesis -
16
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
17
-
18
Design And Implementation Of Human Crowd Density Estimation System With Energy Harvesting In Wireless Sensor Network Platform
Published 2017“…To mitigate the limited sensing capability, a human crowd density estimation (H-CDE) system based on ZigBee and wireless sensor network technology is proposed that increases the crowd detection range to 30 m with only one transmission node required every 37.5 m2. …”
Get full text
Get full text
Thesis -
19
Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI
Published 2019“…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
Get full text
Get full text
Monograph -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis
