Search Results - (( based generation method algorithm ) OR ( pattern detection method algorithm ))
Search alternatives:
- generation method »
- pattern detection »
- based generation »
- method algorithm »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…Together with Kernel method (see Silverman, 1986), we improve the process of finding the number of components in GMM. …”
Get full text
Get full text
Get full text
Thesis -
2
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
4
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
Get full text
Thesis -
5
Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim
Published 2025“…The increasing complexity of modern power systems necessitates advanced methods for detecting and classifying power quality disturbances (PQDs), which impact system reliability and equipment performance. …”
Get full text
Get full text
Thesis -
6
A COMBINED HISTOGRAM OF ORIENTED GRADIENTS AND COMPLETED LOCAL BINARY PATTERN METHODS FOR PEOPLE COUNTING IN A DENSE CROWD SCENARIO
Published 2016“…This method used a collaborative Histogram of Oriented Gradients (HOG) and Completed Local Binary Pattern (CLBP) based on people detection algorithm to detect headshoulder region. …”
Get full text
Get full text
Thesis -
7
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
8
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…For generating an interpretable deep architecture for identifying deep intrusion patterns, this study proposes an approach that combines ANFIS (Adaptive Network-based Fuzzy Inference System) and DT (Decision Tree) for interpreting the deep pattern of intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…The stereo vision algorithm computes disparity using local, global, and semiglobal optimisation methods established by the researcher. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
Get full text
Get full text
Get full text
Article -
12
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…In addition, human activity detection methods have wide applications in security, surveillance and postural detection to prevent falls in elderly. …”
Get full text
Get full text
Get full text
Thesis -
13
Adaptive edge detection and image filtering using light sensor
Published 2005“…An edge detection algorithm should be able to be use for all images captured in various environment conditions. …”
Get full text
Get full text
Conference or Workshop Item -
14
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…A number of researchers keep on proposing various alternative framework consisting detection methods day by days in combating activities such as single classification and rule based approach. …”
Get full text
Get full text
Get full text
Technical Report -
15
Isolation, detection and genomic differentiation of escherichia coli from aquatic environments in Kelantan, Malaysia
Published 2009“…A dendrogram generated by the UPGMA algorithm showed 4 clusters of E. coli isolates based on 80 similarity. …”
Get full text
Get full text
Get full text
Article -
16
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
17
-
18
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
19
-
20
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…Plots of survival distribution function against failure time are used to examine the predicted survival patterns for the two types of failures. In this thesis we develop a modified Fine and Gray methods to increase the sensitivity of the models and these methods are tested and compared. …”
Get full text
Get full text
Thesis
