Search Results - (( pattern detection method algorithm ) OR ( _ integration method algorithm ))
Search alternatives:
- integration method »
- pattern detection »
- method algorithm »
- _ integration »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
2
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
3
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification
Published 2020“…In this paper, a â��butterflyâ�� shape derived from the manipulation of the standard PV and OP data, which is more robust towards different loop dynamics, is developed for stiction detection. This simple model-free butterfly shape-based detection (BSD) method uses Stenman's one parameter stiction model, which results in a distinctive â��butterflyâ�� pattern in the presence of stiction. …”
Get full text
Get full text
Article -
5
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
6
Can recognition using LABVIEW / Jamilah Othman
Published 2008Get full text
Get full text
Student Project -
7
Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi
Published 2024“…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
Get full text
Get full text
Student Project -
8
Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim
Published 2025“…The increasing complexity of modern power systems necessitates advanced methods for detecting and classifying power quality disturbances (PQDs), which impact system reliability and equipment performance. …”
Get full text
Get full text
Thesis -
9
Analysis of banana plant health using machine learning techniques
Published 2024“…Automated systems that integrate machine learning and deep learning algorithms have proven to be effective in predicting diseases. …”
Get full text
Get full text
Get full text
Article -
10
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019“…Next, spectral analysis, as a tool to identify events with different frequency content is used which can detect the patterns related to faulting and fracturing of the subsurface layers. …”
Get full text
Get full text
Conference or Workshop Item -
11
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. The GLS is 7.8 and 5.5 times faster than A* and LS, respectively, generating a path 1.2 and 1.5 times shorter than A* and LS. …”
Get full text
Thesis -
13
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which, the legal and illegal behaviours could identify. …”
Get full text
Get full text
Get full text
Article -
14
Accelerating FPGA-surf feature detection module by memory access reduction
Published 2019“…We also found that the SURF algorithm memory access has redundant repeating pattern that can be reduced. …”
Get full text
Get full text
Get full text
Article -
15
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which the legal and illegal behaviours could identified. …”
Get full text
Get full text
Get full text
Technical Report -
16
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
17
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…To solve the problem, this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately. …”
Get full text
Get full text
Get full text
Article -
18
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
Get full text
Get full text
Get full text
Article -
19
Application of terrain analysis to the mapping and spatial pattern analysis of subsurface geological fractures of Kuala Lumpur limestone bedrock, Malaysia.
Published 2012“…The second is an automatic detection method using a topographical fabric algorithm that uses a DEM to create a map of ridges, which represent the footwalls of geological fractures, and valleys (channels), which reflect geological fracture zones. …”
Get full text
Get full text
Article -
20
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007“…It is very important to identify new integration of classification or clustering algorithm especially in neuro fuzzy domain as compared to conventional or traditional method. …”
Get full text
Get full text
Get full text
Book Section
