Search Results - (( java implementation matching algorithm ) OR ( pattern deviation selection algorithm ))
Search alternatives:
- implementation matching »
- java implementation »
- deviation selection »
- selection algorithm »
- pattern deviation »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Fault diagnostic algorithm for precut fractionation column
Published 2004“…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
Get full text
Get full text
Conference or Workshop Item -
3
Geomorphometric analysis of landform pattern using topographic position and ASTER GDEM
Published 2017“…Maximum Elevation Deviation was selected to measure the spatial landscape pattern at the maximum (3000) scale of the absolute DEV value within the scale (DEVmax), and finally, high-pass filter algorithm was used to identify the extreme topography (ridges/valleys). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
6
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
7
A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection
Published 2022“…Meanwhile, for improving the efciency of training and predicting, Pearson Correlation analysis, standard deviation, and a new adaptive K-means are used to select attributes and make fuzzy interval decisions. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Optimal placement and sizing of distributed generation in radial distribution networks using particle swarm optimization and forward backward sweep method
Published 2012“…Improvements in the voltage profile, power loss and voltage deviation reduction have been achived.…”
Get full text
Get full text
Thesis -
9
A Bio-Inspired Behavior-Based Hybrid Framework for Ransomware Detection
Published 2026journal-article -
10
-
11
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…During location estimation, current histogram of RSS at unknown location will be compared to the database. The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
12
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
13
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
14
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025“…Machine learning is able to learn complex relationships within large datasets then identify anomalies that deviate from well-defined patterns. This enables machine learning model to detect those suspicious activities more accurately than traditional approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Monitoring and assessment of weld penetration condition during pulse mode laser welding using air-borne acoustic signal
Published 2021“…Signal features, such as mean absolute deviation (MAD), standard deviation (SD), kurtosis (K), L-scale (LS), L-kurtosis (LK), bandpower (BP), and sum of synchrosqueezed wavelet coefficient (CSqWCsum) were extracted from the acquired sound. …”
Get full text
Get full text
Thesis -
16
UV-vis spectrophotometric and artificial neural network for estimation of ammonia in aqueous environment using cobalt(II) ions
Published 2024“…A set of absorbance data for the [Co(NH3)(6)](2+) complex at selected wavelengths was input for ANN training using a back-propagation algorithm. …”
Article -
17
Assessment of near-infrared and mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm plantation
Published 2013“…Reflectance spectra were pre-processed and principal component analysis (PCA) was performed to obtain PC scores as input features used in different pattern recognition algorithms in order to select the best learning model of Ganoderma discrimination. …”
Get full text
Get full text
Thesis
