Search Results - (( pattern detection system algorithm ) OR ( parameter detection method algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    The development of extra axial brain tumor detection prototype using back propagation based neural network / Suriyanti Panagen by Panagen, Suriyanti

    Published 2006
    “…Knowledge appearance is compulsory for neural network in which it comes under the training phase before it recognize or detecting any pattern.A study about the artificial neural network has been done and back propagation training algorithm is suitable for this system development. …”
    Get full text
    Get full text
    Thesis
  5. 5

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi by Mohadi, Masnizah

    Published 2005
    “…The useful features of information that was extracted from the handwritten character images are the edges of the character using Sobel Edge Detection Method. As a result of this project, it is proven that the backpropagation algorithm can be used for recognizing handwritten characters and recognition tasks depends highly on how the data was preprocessed and the network parameter itself.…”
    Get full text
    Get full text
    Thesis
  7. 7

    HEp-2 cell images classification based on statistical texture analysis and fuzzy logic by Jamil, N.F.B., Faye, I., May, Z.

    Published 2014
    “…This paper proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A Design Of License Plate Recognition System Using Convolutional Neural Network by Ahmad Radzi, Syafeeza, Piramli, Muhamad Marzuki, Wong, Yan Chiew, Abdul Hamid, Norihan, Ali, Nur Alisa, Mat Ibrahim, Masrullizam

    Published 2019
    “…This paper proposes an improved Convolutional Neural Network (CNN) algorithm approach for license plate recognition system. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani by Ghani, Mazuraini

    Published 2005
    “…In this project, the suitable method of segmentation is local adaptive threshold. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes by Yee, Cong Kai

    Published 2019
    “…The findings prove that the proposed concept is applicable and provides an alternative method for conventional fringe analysis techniques such as transform-based algorithms or phase-shifting algorithms to advance high-speed 3D profilometry.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Hybrid vehicle engine misfire detection using Piezo-film Sensors and analysing with Z-freq / Nor Azazi Ngatiman and Mohd Zaki Nuawi by Ngatiman, Nor Azazi, Nuawi, Mohd Zaki

    Published 2018
    “…This paper explores the application of standard deviation and kurtosis to formulate a new statistical method for hybrid electric vehicle (HEV) engine misfire detection named as Z-freq. …”
    Get full text
    Get full text
    Article
  13. 13

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Proposed conceptual Iot-based patient monitoring sensor for predicting and controlling dengue by Hassan N.H., Salwana E., Drus S.M., Maarop N., Samy G.N., Ahmad N.A.

    Published 2023
    “…Therefore, this paper provides a recent review of the latest methods and algorithms used to design wearable sensor for patient monitoring in dengue outbreak. …”
    Article
  16. 16

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…The results learned from the resistivity survey confirmed the pattern of a continuous structure of layers, as detected from the borehole and geological information. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…This helps to facilitate semi-skillful users to implement the tree counting algorithms. Users are required to input three parameters which are, image resolution, planting distance of oil palm trees as well as the diameter of oil palm crown, in order to operate the interface. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period by Zulkarnain, Norsyahidah, Mohammad, Nurul Farahain, Ahmed Shogar, Ibrahim Adam

    Published 2023
    “…This study implemented the preliminary stage of forecasting the COVID-19 data using the proposed SEIRD model and highlighted the importance of parameter optimization. The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia by Abu Kasim, Junainah

    Published 2020
    “…The study also applied land surface emissivity (LSE) algorithm to determine the LST value extracted from the Band 10 parameter of Landsat 8 OLI/TIRS. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis