Search Results - (( data integration method algorithm ) OR ( pattern detection method algorithm ))
Search alternatives:
- integration method »
- pattern detection »
- data integration »
- method algorithm »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
2
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification
Published 2020“…In this paper, a â��butterflyâ�� shape derived from the manipulation of the standard PV and OP data, which is more robust towards different loop dynamics, is developed for stiction detection. This simple model-free butterfly shape-based detection (BSD) method uses Stenman's one parameter stiction model, which results in a distinctive â��butterflyâ�� pattern in the presence of stiction. …”
Get full text
Get full text
Article -
4
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
5
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019“…Next, spectral analysis, as a tool to identify events with different frequency content is used which can detect the patterns related to faulting and fracturing of the subsurface layers. …”
Get full text
Get full text
Conference or Workshop Item -
6
Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim
Published 2025“…The increasing complexity of modern power systems necessitates advanced methods for detecting and classifying power quality disturbances (PQDs), which impact system reliability and equipment performance. …”
Get full text
Get full text
Thesis -
7
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
Get full text
Thesis -
8
Accelerating FPGA-surf feature detection module by memory access reduction
Published 2019“…We also found that the SURF algorithm memory access has redundant repeating pattern that can be reduced. …”
Get full text
Get full text
Get full text
Article -
9
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
Get full text
Get full text
Get full text
Article -
10
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability.…”
Get full text
Get full text
Get full text
Article -
11
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007“…It is very important to identify new integration of classification or clustering algorithm especially in neuro fuzzy domain as compared to conventional or traditional method. …”
Get full text
Get full text
Get full text
Book Section -
12
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…These findings highlight the value of visualization as a preliminary data quality assessment tool and suggest future integration with advanced detection algorithms to enhance robustness and scalability…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Effective source number enumeration approach under small snapshot numbers
Published 2024“…This study also makes a significant contribution to data science by providing a comprehensive method for estimating the number of signal sources, which is integrated with a machine learning model. …”
Get full text
Get full text
Get full text
Thesis -
14
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
15
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
16
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…This research lays the foundation for future investigations into integrating methods for stable augmented reality applications in cooling systems. …”
Get full text
Get full text
Thesis -
17
A study on component-based technology for development of complex bioinformatics software
Published 2004“…SOM and K-Means are integrated as a clustering algorithm to produce a granular input, while SVM is then used as a classifier. …”
Get full text
Get full text
Monograph -
18
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
19
Robust techniques for linear regression with multicollinearity and outliers
Published 2016“…The proposed method is formulated by incorporating robust MM-estimator and the modified generalized M-estimator (MGM) in the LRR algorithm. …”
Get full text
Get full text
Thesis -
20
Reservoir inflow forecasting with a modified coactive neuro-fuzzy inference system: a case study for a semi-arid region
Published 2018“…Existing forecast models applied for reservoir inflow forecasting encounter several drawbacks, due to the difficulty of the underlying mathematical procedures being to cope with and to mimic the naturalization and stochasticity of the inflow data patterns. In this study, appropriate adjustments to the conventional coactive neuro-fuzzy inference system (CANFIS) method are proposed to improve the mathematical procedure, thus enabling a better detection of the high nonlinearity patterns found in the reservoir inflow training data. …”
Get full text
Get full text
Article
