Search Results - (( data classification _ algorithm ) OR ( variable detection method algorithm ))
Search alternatives:
- data classification »
- variable detection »
- method algorithm »
-
1
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The performance of the proposed method is illustrated using simulation study and on glass vessel data with 1920 variables, cardiomyopathy microarray data with 6319 variables, and octane data with 226 dimensions. …”
Get full text
Get full text
Thesis -
2
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Pattern Recognition for Human Diseases Classification in Spectral Analysis
Published 2022“…Typically, pattern recognition consists of two components: exploratory data analysis and classification method. Exploratory data analysis is an approach that involves detecting anomalies in data, extracting essential variables, and revealing the data’s underlying structure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
5
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…This thesis proposes a classification model to detect water leakage, focusing on finding water leakage’s location and size, using K-Nearest Neighbour (K-NN) classification method. …”
Get full text
Get full text
Thesis -
6
Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine
Published 2022“…Classification is an essential task for many applications, including text classification, image classification, data classification, and so on. …”
Get full text
Get full text
Article -
7
Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine
Published 2022“…Classification is an essential task for many applications, including text classification, image classification, data classification, and so on. …”
Get full text
Get full text
Article -
8
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…Automated system also saves time and cost as the system is able to process large amount of image data at one time. This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
9
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
10
HEp-2 cell images classification based on statistical texture analysis and fuzzy logic
Published 2014“…This method is applied to the data set of the ICPR 2012 contest. …”
Get full text
Get full text
Conference or Workshop Item -
11
Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm
Published 2015“…We then review the state-of-the-art US-based CAD techniques that utilize a range of image texture based features like entropy, Local Binary Pattern (LBP), Haralick textures and run length matrix in several automated decision making algorithms. These classification algorithms are trained using the features extracted from the patient data in order for them to learn the relationship between the features and the end-result (FLD present or absent). …”
Get full text
Get full text
Get full text
Article -
12
Chemometrics analysis for the detection of dental caries via ultraviolet absorption spectroscopy / Katrul Nadia Basri
Published 2023“…Dimension reduction algorithm such as LDA and CNN were applied on the spectra to reduce the number of variables to be trained. …”
Get full text
Get full text
Thesis -
13
A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping
Published 2014“…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
Get full text
Get full text
Article -
14
Detection and Classification of Moving Objects for an Automated Surveillance System
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
15
Detection and classification of moving objects for an automated surveillance system
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
16
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
17
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
18
Detection and classification of moving objects for an automated surveillance system
Published 2006“…The applied post processing module capable to remove noise and shadow from the detected objects with less than 1% of error. Finally, classification algorithm that makes use of the extracted moment values from the detected objects successfully categorize objects into pre-defined classes of human and vehicle with 89.08% of accuracy. …”
Get full text
Get full text
Thesis -
19
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Nevertheless, various concerns over the homogeneity of data based on patient selection, scanner effects, and the variable usage of classifiers and algorithms pose a challenge for ML-based image interpretation of rs-fMRI datasets to become a mainstream option for diagnosing AD and predicting the conversion of HC/MCI to AD.…”
Get full text
Get full text
Get full text
Article -
20
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis
