Search Results - pattern detection ((using algorithm) OR (clustering algorithm))

Refine Results
  1. 1

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Detection of tube defect using the autoregressive algorithm by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…This study is aimed to automate defect detection using the pattern recognition approach based on the classification of high frequency stress wave signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…Clustering is one of the promising techniques used in Anomaly Intrusion Detection (AID), especially when dealing with unknown patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…Without human input, these algorithms discover patterns or groupings in the data. …”
    Get full text
    Get full text
    Article
  11. 11

    Alternate methods for anomaly detection in high-energy physics via semi-supervised learning by Md. Ali, Mohd. Adli, Badrud’din, Nu’man, Abdullah, Hafidzul, Kemi, Faiz

    Published 2020
    “…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…In this thesis, the accuracy of the proposed algorithm was evaluated using two standard online benchmarking database systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…In this study, we propose an efficient clustering procedure to identify multiple outliers in the linear functional relationship model using the single linkage algorithm with the Euclidean distance as the similarity measure. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…SOM and K-Means are integrated as a clustering algorithm to produce a granular input, while SVM is then used as a classifier. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…The results obtained were satisfying, where the algorithm were able to detect and remove the rain streaks without losing the aliveness of the scene. …”
    Get full text
    Get full text
    Thesis
  19. 19

    STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION by Adil H., Khan, Dayang Nurfatimah, Awang Iskandar, Jawad F., Al-Asad, SAMIR, EL-NAKLA, SADIQ A., ALHUWAIDI

    Published 2021
    “…A boost ensemble learning algorithm using Support Vector Machines (SVM) as initial classifiers and Artificial Neural Networks (ANN) as a final classifier is employed to learn the patterns of different skin lesion class features. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article