Search Results - (( based detection method algorithm ) OR ( pattern generation based algorithm ))
Search alternatives:
- pattern generation »
- method algorithm »
- generation based »
- based detection »
-
1
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
3
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
Get full text
Thesis -
4
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
5
Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim
Published 2025“…A simulation-based methodology was adopted, leveraging MATLABO/Simulink to model a power grid and generate synthetic PQD waveforms. …”
Get full text
Get full text
Thesis -
6
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
7
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…For generating an interpretable deep architecture for identifying deep intrusion patterns, this study proposes an approach that combines ANFIS (Adaptive Network-based Fuzzy Inference System) and DT (Decision Tree) for interpreting the deep pattern of intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A COMBINED HISTOGRAM OF ORIENTED GRADIENTS AND COMPLETED LOCAL BINARY PATTERN METHODS FOR PEOPLE COUNTING IN A DENSE CROWD SCENARIO
Published 2016“…This method used a collaborative Histogram of Oriented Gradients (HOG) and Completed Local Binary Pattern (CLBP) based on people detection algorithm to detect headshoulder region. …”
Get full text
Get full text
Thesis -
9
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…The stereo vision algorithm computes disparity using local, global, and semiglobal optimisation methods established by the researcher. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Adaptive edge detection and image filtering using light sensor
Published 2005“…An edge detection algorithm should be able to be use for all images captured in various environment conditions. …”
Get full text
Get full text
Conference or Workshop Item -
12
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
Get full text
Get full text
Get full text
Article -
13
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…A number of researchers keep on proposing various alternative framework consisting detection methods day by days in combating activities such as single classification and rule based approach. …”
Get full text
Get full text
Get full text
Technical Report -
14
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…Third, to propose orientation invariant based deep spare autoencoder methods for automatic complex activity identification to minimize orientation inconsistencies and learn adequate data patterns. …”
Get full text
Get full text
Get full text
Thesis -
15
Isolation, detection and genomic differentiation of escherichia coli from aquatic environments in Kelantan, Malaysia
Published 2009“…A dendrogram generated by the UPGMA algorithm showed 4 clusters of E. coli isolates based on 80 similarity. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…Our algorithm works based on prime factorization, and is called Frequent Pattern-Prime Factorization (FPPF).…”
Get full text
Get full text
Conference or Workshop Item -
18
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…It then divides the compressed database into a set of conditional databases (a special kind of projected database), each associated with one frequent item or pattern fragment, and mines each such database separately.For a large database, constructing a large tree in the memory is a time consuming task and increase the time of execution.In this paper we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well.Our algorithm works based on prime factorization, and is called Frequent Pattern- Prime Factorization (FPPF).…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…The undetected group of missing oil palms trees are estimated based on the planting pattern design. Over-counting error can be eliminated by merging the detected trees which depart from each other within a threshold value. …”
Get full text
Get full text
Thesis -
20
Using unique-prime-factorization theorem to mine frequent patterns without generating tree
Published 2011“…In this study we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well. …”
Get full text
Get full text
Get full text
Article
