Search Results - (( using optimization model algorithm ) OR ( pattern detection system algorithm ))
Search alternatives:
- optimization model »
- pattern detection »
- system algorithm »
- model algorithm »
-
1
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
3
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…On the other hand, network compression and acceleration techniques such as pruning and quantization also been the focus of the studies for light-weight algorithms in embedded system. While in our studies, we primarily focusing on the deployment and fine-tuning of deep learning model which is YOLOv5 for PCB defects detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
6
Classification of diabetic retinopathy clinical features using image enhancement technique and convolutional neural network / Abdul Hafiz Abu Samah
Published 2021“…In general, this thesis introduces an automated machine learning algorithm for detecting diabetic retinopathy (DR) in fundus images. …”
Get full text
Get full text
Thesis -
7
Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq
Published 2024“…DR can be detected either manually by an Ophthalmologist or using an automated system. …”
Get full text
Get full text
Get full text
Thesis -
8
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
9
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Results include descriptive and correlation analysis revealing crucial primary cooling system data patterns. Predictive modelling using k-nearest neighbour demonstrates high accuracy, precision, and recall metrics, while decision tree modelling raises considerations for further refinement. …”
Get full text
Get full text
Thesis -
10
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007“…A package of software based on neuro fuzzy model (ANFIS) has been developed using MATLAB software and optimization were done with the help from WEKA. …”
Get full text
Get full text
Get full text
Book Section -
11
Classification of heart sound signals for the detection of heart diseases / N. Shamsuddin and M. N. Taib
Published 2012“…The obtained frequency pattern features were fed to the FFNN and trained using Resilient Backpropagation (RPROP) algorithm. …”
Get full text
Get full text
Get full text
Article -
12
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
13
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
Get full text
Get full text
Conference or Workshop Item -
14
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…Lastly, the MFO-selected features were used as the input for a support vector machine (SVM) diagnostic model to identify fault patterns. …”
Get full text
Get full text
Get full text
Article -
15
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…LR model was used to find the corresponding coefficients of best fitting function that assess the optimal terminal nodes. …”
Get full text
Get full text
Conference or Workshop Item -
16
Modified Seird model: a novel system dynamics approach in modelling the spread of Covid-19 in Malaysia during the pre-vaccination period
Published 2023“…The mathematical model is solved numerically using built-in Python function ‘odeint’ from the Scipy library, which by default uses LSODA algorithm from the Fortran library Odepack that adopts the integration method of non-stiff Adams and stiff Backward Differentiation (BDF) with automatic stiffness detection and switching. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph
