Search Results - (( based optimization method algorithm ) OR ( pattern detection clustering algorithm ))
Search alternatives:
- detection clustering »
- pattern detection »
- method algorithm »
-
1
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
2
Detecting lung cancer region from CT image using meta-heuristic optimized segmentation approach
Published 2022“…In this paper, the butterfly optimization algorithm-based K-means clustering (BOAKMC) method is introduced for reducing CT image segmentation uncertainty. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…Moreover, skin lesion images are clustered based on fused color, pattern and shape based features. …”
Get full text
Get full text
Get full text
Article -
4
A study on component-based technology for development of complex bioinformatics software
Published 2004“…From the enriched GO tree, the BTreeBicluster algorithm is applied during the clustering process. …”
Get full text
Get full text
Monograph -
5
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007“…It is very important to identify new integration of classification or clustering algorithm especially in neuro fuzzy domain as compared to conventional or traditional method. …”
Get full text
Get full text
Get full text
Book Section -
6
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…Data mining is known as the process of detection concerning patterns from essential amounts of data. …”
Get full text
Get full text
Get full text
Article -
7
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
8
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…This is followed by the clustering of the liver tissues using particle swarm optimized spatial FCM algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Image segmentation using an adaptive clustering technique for the detection of acute leukemia blood cells images
Published 2024Conference Paper -
11
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
Get full text
Get full text
Conference or Workshop Item -
12
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Detection of tube defect using the autoregressive algorithm
Published 2015“…This study is aimed to automate defect detection using the pattern recognition approach based on the classification of high frequency stress wave signals. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…The pattern of the features such as intensity and pitch are observed and clustered to find out how many patterns can be identified from all the words. …”
Get full text
Get full text
Thesis -
15
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The signals were then clustered using the feature extraction algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Clustering is one of the promising techniques used in Anomaly Intrusion Detection (AID), especially when dealing with unknown patterns. …”
Get full text
Get full text
Get full text
Article -
17
Image Segmentation Using an Adaptive Clustering Technique for the Detection of Acute Leukemia Blood Cells Images
Published 2024Proceedings Paper -
18
Application of kohonen neural network and rough approximation for overlapping clusters optimization
Published 2008“…Experiments show that the proposed two-level algorithm is more accurate and generates fewer errors as compared with crisp clustering operations.…”
Get full text
Get full text
Article -
19
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Without human input, these algorithms discover patterns or groupings in the data. …”
Get full text
Get full text
Article -
20
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis
