Search Results - (( based evaluation new algorithm ) OR ( pattern detection system algorithm ))*
Search alternatives:
- pattern detection »
- based evaluation »
- system algorithm »
- evaluation new »
- new algorithm »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
2
Danger theory inspired artificial immune system for pattern recognition
Published 2007“…Based on ongoing initiatives in outlining OT algorithm, this research evaluates the performance of OT against NS algorithm within pattern recognition domain. …”
Get full text
Get full text
Research Report -
3
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
4
Autonomous self-exam monitoring for early diabetes detection
Published 2020“…Iris image is used to recognise the early detection of diabetes. Based on iridology theory, the image is evaluated by detecting the presence of broken tissues and change in colour pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. The third one is to evaluate the accuracy of the k Nearest Neighbors algorithm in the classification credit card holder behavior. …”
Get full text
Get full text
Thesis -
6
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
7
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
Get full text
Get full text
Get full text
Thesis -
8
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…However, among the existing ML-based solutions in detecting attack patterns, many of them are computationally expensive, require a long training time, and a considerably large amount of training data—which are seldom available. …”
Get full text
Get full text
Get full text
Article -
9
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…In this thesis, the accuracy of the proposed algorithm was evaluated using two standard online benchmarking database systems. …”
Get full text
Get full text
Get full text
Thesis -
10
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…After ensuring that the classification technique was able to accomplish this work, Hybrid Genetic Random Forests (HGRF) was introduced as a new ensemble classifier based on a Random Forest algorithm, but altered slightly with some innovations. …”
Get full text
Get full text
Get full text
Thesis -
11
Defect detection based on extreme edge of defective region histogram
Published 2018“…To evaluate the proposed defect-detection method, common standard images for experimentation were used. …”
Get full text
Get full text
Article -
12
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
13
Hybrid vehicle engine misfire detection using Piezo-film Sensors and analysing with Z-freq / Nor Azazi Ngatiman and Mohd Zaki Nuawi
Published 2018“…Existing engine management system is unable to evaluate the performance of each individual piston of the internal combustion engine. …”
Get full text
Get full text
Article -
14
-
15
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
17
-
18
Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali
Published 2013“…The basic idea of our approach is that, as the PROLOG inference engine evaluates the query for the first time, the answers returned by the engine for the query are converted into a justification-based truth-maintenance system (JTMS) network. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph
