Search Results - (( using optimization based algorithm ) OR ( pattern detection problem algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The proposed algorithm will switch its working pattern based on the goal minimum and boundary maximum index distances. …”
    Get full text
    Thesis
  5. 5

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Classification of diabetic retinopathy clinical features using image enhancement technique and convolutional neural network / Abdul Hafiz Abu Samah by Abu Samah, Abdul Hafiz

    Published 2021
    “…To solving pattern classification problem, the optimization deep learning architecture and parameter by using four convolution layers is set up to classify the three pathological signs; HEM, MA and exudate. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network by Sivarao, Subramonian

    Published 2009
    “…Experimentally observed responses were used to train, map and optimize the network algorithms before the best architecture was selected. …”
    Get full text
    Get full text
    Article
  9. 9

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Neuro fuzzy classification and detection technique for bioinformatics problems by Othman, Mohd. Fauzi, Moh, Thomas Shan Yau

    Published 2007
    “…A package of software based on neuro fuzzy model (ANFIS) has been developed using MATLAB software and optimization were done with the help from WEKA. …”
    Get full text
    Get full text
    Get full text
    Book Section
  11. 11
  12. 12
  13. 13

    Robust techniques for linear regression with multicollinearity and outliers by Mohammed, Mohammed Abdulhussein

    Published 2016
    “…The ordinary least squares (OLS) method is the most commonly used method in multiple linear regression model due to its optimal properties and ease of computation. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation of fall detection classification approaches by Kerdegari, Hamideh, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Ghotoorlar, Saeid Mokaram

    Published 2012
    “…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
    Get full text
    Get full text
    Article
  18. 18

    Pattern Recognition for Human Diseases Classification in Spectral Analysis by Nur Hasshima Hasbi, Abdullah Bade, Fuei, Pien Chee, Muhammad Izzuddin Rumaling

    Published 2022
    “…Today, many real issues and scenarios require pattern recognition to aid in the faster resolution of complicated problems, particularly those that cannot be solved using traditional human heuristics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  20. 20