Search Results - (( based evaluation case algorithm ) OR ( pattern detection system algorithm ))*
Search alternatives:
- pattern detection »
- based evaluation »
- system algorithm »
- evaluation case »
- case algorithm »
-
1
Scalability and performance in duplicate detection : relational vs. graph database
Published 2023“…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Autonomous self-exam monitoring for early diabetes detection
Published 2020“…Iris image is used to recognise the early detection of diabetes. Based on iridology theory, the image is evaluated by detecting the presence of broken tissues and change in colour pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…In order to measure performance of the proposed algorithm, evaluation was done by several independent UCI datasets and the results were compared with RF and some individual classifiers. …”
Get full text
Get full text
Get full text
Thesis -
4
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
9
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
10
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
11
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
12
Evaluation of fall detection classification approaches
Published 2012“…An accurate automatic fall detection system can help elderly people be safe in every situation. …”
Get full text
Get full text
Conference or Workshop Item -
13
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
14
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
15
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
Get full text
Get full text
Article -
16
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
17
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Therefore, there is a strong need to automate this process. Such automated systems must rely on robust and effective algorithms for detection and prediction. …”
Get full text
Article -
18
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Circular discontinuities detection in welded joints using Circular Hough Transform
Published 2009Get full text
Article -
20
Cabbage disease detection system using k-NN algorithm
Published 2022“…Plant disease study means the study of disease patterns that can be visually seen on plants. The main objective of this research is to develop a prototype system with the help of machine learning to detect cabbage diseases which are Alternaria Leaf Spot disease, Mosaic Virus disease, Downy Fungus disease, Bacterial Soft Rot disease, and Black Rot disease . …”
Get full text
Get full text
Get full text
Academic Exercise
