Search Results - (( peer evaluation method algorithm ) OR ( pattern detection using algorithm ))
Search alternatives:
- pattern detection »
- method algorithm »
- peer evaluation »
- using algorithm »
-
1
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
5
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…These images are then processed using Yolov7, a state-of-the-art object detection algorithm, to accurately identify and classify surface cracks. …”
Get full text
Get full text
Conference or Workshop Item -
6
Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi
Published 2024“…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
Get full text
Get full text
Student Project -
7
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
8
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method used Hessian to detect the keypoints and their corresponding features are represented by robust descriptor known as Center symmetric local binary pattern (CSLBP). …”
Get full text
Get full text
Thesis -
9
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
10
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
11
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
12
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
14
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…This thesis proposes an algorithm to handle the limitations. Firstly, pre-processing used Sobel Filter was added at initial step to compensate photometric distortion of input images. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Effective mining on large databases for intrusion detection
Published 2014“…These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the intrusion detection system. Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. …”
Get full text
Get full text
Conference or Workshop Item -
16
Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel
Published 2024“…Several imaging, computer vision, and pattern recognition algorithms are employed to describe five dermoscopic features. …”
Get full text
Get full text
Get full text
Thesis -
17
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The study of traditional marble game will be implemented in a game prototype using Ant Colony Optimization (ACO). ACO technique is used for searching method in order to find the nearest marble that can be selected to be shot. …”
Get full text
Get full text
Thesis -
18
-
19
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019“…Next, spectral analysis, as a tool to identify events with different frequency content is used which can detect the patterns related to faulting and fracturing of the subsurface layers. …”
Get full text
Get full text
Conference or Workshop Item -
20
