Search Results - (( based constructive method algorithm ) OR ( pattern detection system algorithm ))

Refine Results
  1. 1

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…These analyses provide nuanced insights into system operational dynamics and efficiency. Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain by Ong, Pauline, Tieh, Tony Hieng Cai, Lai, Kee Huong, Lee, Woon Kiow, Ismon, Maznan

    Published 2019
    “…Rotating machinery—a crucial component in modern industry, requires vigilant monitoring such that any potential malfunction of its electromechanical systems can be detected prior to a fatal breakdown. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Automatic recognition of freshwater algae (Oscillatoria sp.) using image processing techniques with artificial neural network approach / Awatef Saad Salem Saad by Salem Saad, Awatef Saad

    Published 2012
    “…Computer-based image analysis and pattern recognition methods were used to construct a system that is able to identify, and classify selected Cyanobacteria genus automatically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Design And Implementation Of Human Crowd Density Estimation System With Energy Harvesting In Wireless Sensor Network Platform by Fadhlullah, Solahuddin Yusuf

    Published 2017
    “…To mitigate casualties in crowd-related disaster, radio frequency-based crowd density estimation and monitoring system is being developed as a safety tool. Current systems have limited monitoring capabilities; low size of crowd monitored, low detection range, high number of transceivers required and finite operational lifetime. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…The electronic hardware and hand robot structure were integrated to develop an EMG controlled hand robot prototype, and its functionality was tested through three stages: muscular activity detection only, object detection only and the integration of both detection in an algorithm to control the hand robot structure movement to perform opened hand palm and some grasping postures with two trial for each stage. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  13. 13

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Evaluation of fall detection classification approaches by Kerdegari, Hamideh, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Ghotoorlar, Saeid Mokaram

    Published 2012
    “…An accurate automatic fall detection system can help elderly people be safe in every situation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia by Abu Kasim, Junainah

    Published 2020
    “…Thirdly, to develop an automated spatial prediction model that could potentially predict the UGS changes and their effect on the LST pattern. This research also tested the suitability of object-based classification methods of high-resolution aerial imagery using the support vector machine (SVM) classifier regarding its capability to correctly classify and recognise UGS patterns. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
    Get full text
    Get full text
    Article