Search Results - (( based optimization system algorithm ) OR ( pattern detection clustering algorithm ))

Refine Results
  1. 1

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Neuro fuzzy classification and detection technique for bioinformatics problems by Othman, Mohd. Fauzi, Moh, Thomas Shan Yau

    Published 2007
    “…This paper explores the suitability and performance of recurrent classification technique, fuzzy c means (FCM) act as classifier in neuro fuzzy system compared to subclustering method. A package of software based on neuro fuzzy model (ANFIS) has been developed using MATLAB software and optimization were done with the help from WEKA. …”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4
  5. 5

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…LR model was used to find the corresponding coefficients of best fitting function that assess the optimal terminal nodes. A cluster pattern of landslide locations was extracted in previous study using nearest neighbor index (NNI), which were then used to identify the clustered landslide locations range. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…This is followed by the clustering of the liver tissues using particle swarm optimized spatial FCM algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Detection of tube defect using the autoregressive algorithm by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…This study is aimed to automate defect detection using the pattern recognition approach based on the classification of high frequency stress wave signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…The pattern of the features such as intensity and pitch are observed and clustered to find out how many patterns can be identified from all the words. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…Clustering is one of the promising techniques used in Anomaly Intrusion Detection (AID), especially when dealing with unknown patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Application of kohonen neural network and rough approximation for overlapping clusters optimization by Mohebi, E., Md. Sap, Mohd. Noor

    Published 2008
    “…Experiments show that the proposed two-level algorithm is more accurate and generates fewer errors as compared with crisp clustering operations.…”
    Get full text
    Get full text
    Article
  18. 18

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…Without human input, these algorithms discover patterns or groupings in the data. …”
    Get full text
    Get full text
    Article
  19. 19

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…Outliers are some observation points outside the usual pattern of the other observations. It is essential to detect outliers as anomalous observations can affect the inference made in the analysis. …”
    Get full text
    Get full text
    Get full text
    Article