Search Results - (( using optimization approach algorithm ) OR ( pattern detection system algorithm ))
Search alternatives:
- optimization approach »
- pattern detection »
- system algorithm »
-
1
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
2
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
3
-
4
Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq
Published 2024“…DR can be detected either manually by an Ophthalmologist or using an automated system. …”
Get full text
Get full text
Get full text
Thesis -
5
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Scalability and performance in duplicate detection : relational vs. graph database
Published 2023“…As a result, they may not be effective in identifying and resolving duplicate data in certain use cases. Graph-based algorithms such as community detection, may prove beneficial as it can capture a more complex relationships between data. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Results include descriptive and correlation analysis revealing crucial primary cooling system data patterns. Predictive modelling using k-nearest neighbour demonstrates high accuracy, precision, and recall metrics, while decision tree modelling raises considerations for further refinement. …”
Get full text
Get full text
Thesis -
9
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…Only one dynamic variable is used as a tuning parameter reducing the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
Get full text
Get full text
Conference or Workshop Item -
11
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007“…A package of software based on neuro fuzzy model (ANFIS) has been developed using MATLAB software and optimization were done with the help from WEKA. …”
Get full text
Get full text
Get full text
Book Section -
12
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…For this purpose, this study used the intensification and diversification properties of the recently proposed moth-flame optimisation (MFO) algorithm and utilised the algorithm in the proposed feature selection scheme. …”
Get full text
Get full text
Get full text
Article -
13
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
14
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…Based on the location of the lung, the liver dome is automatically detected and the liver is then extracted by random walkers method and refined using a fuzzy level set method. This is followed by the clustering of the liver tissues using particle swarm optimized spatial FCM algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
16
Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period
Published 2023“…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
20
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item
