Search Results - (( using identification using algorithm ) OR ( pattern detection using algorithm ))
Search alternatives:
- using identification »
- identification using »
- pattern detection »
- using algorithm »
-
1
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
2
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
3
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…There are two stages in this algorithm. In the first stage, the pattern of the PDC is analyzed to detect the occurrence of an event. …”
Get full text
Get full text
Article -
4
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Modified Binary Grey Wolf Optimiser (MBGWO) is a modern metaheuristic algorithm that has successfully been used for FS for anomaly detection. …”
Get full text
Get full text
Thesis -
5
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Despite various research on gait event detection for level ground walking, the identification of gait activities on an inclined surface such as stairs, especially using smartphones as sensors, is currently lacking. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
Get full text
Get full text
Get full text
Article -
8
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…Furthermore, RFID data nature characteristics faces the issues likes RFID just carry simple information, in-flood of data, inaccuracy data from RFID readers and difficulties to track spatial and place. We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
Get full text
Get full text
Conference or Workshop Item -
9
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
10
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
11
Analysis of banana plant health using machine learning techniques
Published 2024“…This manuscript examines the prediction and detection of diseases in banana leaves, exploring various diseases, machine learning algorithms, and methodologies. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Fingerprint-based identification has been known and used for a very long time. …”
Get full text
Get full text
Thesis -
14
Detection of tube defect using the autoregressive algorithm
Published 2015“…This study is aimed to automate defect detection using the pattern recognition approach based on the classification of high frequency stress wave signals. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
16
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
17
Early Detection Of ADHD Among Children Using Machine Learning
Published 2023“…Early identification using fMRI and machine learning holds great potential for improving the lives of children with ADHD through timely interventions and targeted support.…”
Get full text
Get full text
Undergraduates Project Papers -
18
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…This project will analyze the texture feature extraction techniques, select and apply the most appropriate technique to corrosion detection problem. The corrosion pattern is to be classified by applying neural network algorithm. …”
Get full text
Get full text
Final Year Project -
19
Personal identification by Keystroke Pattern for login security
Published 2001“…The keystroke rhythm that falls in the behavioral biometric has a unique pattern for each individual. Therefore, these heterogeneous data obtained from normal behavior users can be used to detect intruders in a computer system. …”
Get full text
Get full text
Thesis -
20
Detecting cholesterol presence using iris recognition algorithm
Published 2010Get full text
Working Paper
