Search Results - (( time evaluation method algorithm ) OR ( pattern detection method algorithm ))*
Search alternatives:
- pattern detection »
- method algorithm »
- time evaluation »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
Get full text
Get full text
Thesis -
2
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
3
Random Undersampling on Imbalance Time Series Data for Anomaly Detection
Published 2023Conference Paper -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
5
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
6
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
7
Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi
Published 2024“…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
Get full text
Get full text
Student Project -
8
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel
Published 2024“…Both phases of the research outputs are evaluated and compared with the state-of-the-art methods. …”
Get full text
Get full text
Get full text
Thesis -
10
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
11
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…The proposed method is hybridized with a constant impedance method to improve the system's response time for fast varying load variations. …”
Get full text
Get full text
Get full text
Thesis -
12
Performance Analysis of Real Time Image Processing for Lightning Event Using Cython and Python Programming Languages
Published 2023Conference Paper -
13
Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti
Published 2022“…These results confirmed that the UAV is a very useful form of technology in road maintenance applications, at the same time, contributing in alternative method of pothole information extraction. …”
Get full text
Get full text
Thesis -
14
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
15
Real time vein visualization using near-infrared imaging
Published 2020“…Although the concept behind the technique is not complicated, the vein pattern acquisition method and the design and implementation of image processing algorithms become challenging. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
17
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
18
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
19
-
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis
