Search Results - (( pattern detection method algorithm ) OR ( _ validation method algorithm ))

Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Finally, both algorithms are validated against the findings in various literatures. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  3. 3

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
    Get full text
    Get full text
    Article
  4. 4

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom

    Published 2022
    “…As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi by Rusdinadi, Saffa Nasuha

    Published 2024
    “…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Performance of Levenberg-Marquardt neural network algorithm in power quality disturbances classification / Adibah I’zzah Mohamad Kasim by Mohamad Kasim, Adibah I’zzah

    Published 2025
    “…The increasing complexity of modern power systems necessitates advanced methods for detecting and classifying power quality disturbances (PQDs), which impact system reliability and equipment performance. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7 by Rusdinaidi, Saffa Nasuha, Hashim, Khairil Afendy, Ahmad Dahlan, Zaki

    Published 2024
    “…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network by Sivarao, Subramonian

    Published 2009
    “…On the other hand, when we use computers to reduce uncertainty, the computer itself can become an expert in a specific field through a variety of methods. One such method is machine learning, which involves computer algorithm to capture hidden knowledge from data. …”
    Get full text
    Get full text
    Article
  9. 9

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the intrusion detection system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection by Jia, Lu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…Using 22 attributes that highly related to the target, the performance of the proposed method achieves a 99.86% detection rate and 0.14% false alarm rate on the KDDTrain+dataset, a 77.46% detection rate on the KDDTest+dataset, which is better than many classifers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. The search space skipping method has been proposed to improve the CS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A Design Of License Plate Recognition System Using Convolutional Neural Network by Ahmad Radzi, Syafeeza, Piramli, Muhamad Marzuki, Wong, Yan Chiew, Abdul Hamid, Norihan, Ali, Nur Alisa, Mat Ibrahim, Masrullizam

    Published 2019
    “…The main contribution of this work is on the methodology to determine the best model for four-layered CNN architecture that has been used as the recognition method. This is achieved by validating the best parameters of the enhanced Stochastic Diagonal Levenberg Marquardt (SDLM) learning algorithm and network size of CNN. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…Meanwhile, nine (9) classifier algorithms and forty (40) band stack combinations were deployed to classify the pothole edge. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…The stereo vision algorithm computes disparity using local, global, and semiglobal optimisation methods established by the researcher. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Sequential pattern mining using personalized minimum support threshold with minimum items by Alias, Suraya, Razali, Mohd Norhisham, Tan, Soo Fun, Sainin, Mohd Shamrie

    Published 2011
    “…One of the challenges of Sequential Pattern Mining is finding frequent sequential patterns in a huge click stream data (web logs) since the data has the issue of a very low support distribution.By applying a Frequent Pattern Discovery technique, a sequence is considered as frequent if it occurs more than the minimum support (min sup) threshold value.The conventional method of assuming one min sup value is valid for all levels of k-sequence, may have an impact on the overall results or pattern generation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    2D and 3D video scene text classification by Xu, J., Shivakumara, P., Lu, T., Tan, C.L.

    Published 2014
    “…Experimental results on clasifying 2D and 3D text images are promising, and the result re further validated by text detection and recognition before clasification and after clasification with the exiting methods, respectively.…”
    Get full text
    Get full text
    Conference or Workshop Item