Search Results - (( based detection method algorithm ) OR ( pattern generation based algorithm ))

Refine Results
  1. 1

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
    Get full text
    Thesis
  4. 4

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim by Mohamad Kasim, Adibah I’zzah

    Published 2025
    “…A simulation-based methodology was adopted, leveraging MATLABO/Simulink to model a power grid and generate synthetic PQD waveforms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection by Jia, Lu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…For generating an interpretable deep architecture for identifying deep intrusion patterns, this study proposes an approach that combines ANFIS (Adaptive Network-based Fuzzy Inference System) and DT (Decision Tree) for interpreting the deep pattern of intrusion detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A COMBINED HISTOGRAM OF ORIENTED GRADIENTS AND COMPLETED LOCAL BINARY PATTERN METHODS FOR PEOPLE COUNTING IN A DENSE CROWD SCENARIO by PARDIANSYAH, INDRATNO

    Published 2016
    “…This method used a collaborative Histogram of Oriented Gradients (HOG) and Completed Local Binary Pattern (CLBP) based on people detection algorithm to detect headshoulder region. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…The stereo vision algorithm computes disparity using local, global, and semiglobal optimisation methods established by the researcher. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Adaptive edge detection and image filtering using light sensor by Ahmad Bakery, Mohd. Sarizal, Wan Ismail, Wan Ishak, Ramli, Abdul Rahman, Mustafa, Mohd. Marzuki, Razali, Mohd. Hudzari

    Published 2005
    “…An edge detection algorithm should be able to be use for all images captured in various environment conditions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Coordinated Malware Eradication And Remediation Project (CMERP) by Abdollah, Mohd Faizal, S.M.M Yassin, S.M.Warusia Mohamed, Mas’ud, Mohd Zaki, Selamat, Siti Rahayu, Yusof, Robiah, Ahmad, Rabiah, Shahrin @ Sahibuddin, Shahrin

    Published 2019
    “…A number of researchers keep on proposing various alternative framework consisting detection methods day by days in combating activities such as single classification and rule based approach. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  14. 14

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…Third, to propose orientation invariant based deep spare autoencoder methods for automatic complex activity identification to minimize orientation inconsistencies and learn adequate data patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Isolation, detection and genomic differentiation of escherichia coli from aquatic environments in Kelantan, Malaysia by Rathi, A., Thong, Kwai Lin, Chong, V.C.

    Published 2009
    “…A dendrogram generated by the UPGMA algorithm showed 4 clusters of E. coli isolates based on 80 similarity. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A frequent pattern mining algorithm based on FP-growth without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2010
    “…Our algorithm works based on prime factorization, and is called Frequent Pattern-Prime Factorization (FPPF).…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A frequent pattern mining algorithm based on FP-growth without generating tree by Tohid, Hossein, Ibrahim, Hamidah

    Published 2010
    “…It then divides the compressed database into a set of conditional databases (a special kind of projected database), each associated with one frequent item or pattern fragment, and mines each such database separately.For a large database, constructing a large tree in the memory is a time consuming task and increase the time of execution.In this paper we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well.Our algorithm works based on prime factorization, and is called Frequent Pattern- Prime Factorization (FPPF).…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…The undetected group of missing oil palms trees are estimated based on the planting pattern design. Over-counting error can be eliminated by merging the detected trees which depart from each other within a threshold value. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Using unique-prime-factorization theorem to mine frequent patterns without generating tree by Tohidi, Hossein, Ibrahim, Hamidah

    Published 2011
    “…In this study we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well. …”
    Get full text
    Get full text
    Get full text
    Article