Search Results - (( parameters detection method algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  4. 4

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…Next, the insignificant peak is removed by introducing an argument of minimum peak prominence and maximum peak width where the value of the parameters needs to be determined. As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
    Get full text
    Get full text
    Article
  5. 5

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom

    Published 2022
    “…Next, the insignificant peak is removed by introducing an argument of minimum peak prominence and maximum peak width where the value of the parameters needs to be determined. As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…In this paper, a â��butterflyâ�� shape derived from the manipulation of the standard PV and OP data, which is more robust towards different loop dynamics, is developed for stiction detection. This simple model-free butterfly shape-based detection (BSD) method uses Stenman's one parameter stiction model, which results in a distinctive â��butterflyâ�� pattern in the presence of stiction. …”
    Get full text
    Get full text
    Article
  7. 7

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan by Adenan, Muhammad Nasrul Hakim

    Published 2013
    “…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…Hence, the main objective of this research is to address the feasibility and demonstrate the potential of DM in SHM, as well as apply DM technology which includes machine learning, artificial intelligence and statistical methods for damage detection of a lab-scale slab-on-girder bridge and four steel I beams structures using dynamic parameters of structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    The development of extra axial brain tumor detection prototype using back propagation based neural network / Suriyanti Panagen by Panagen, Suriyanti

    Published 2006
    “…Knowledge appearance is compulsory for neural network in which it comes under the training phase before it recognize or detecting any pattern.A study about the artificial neural network has been done and back propagation training algorithm is suitable for this system development. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin by Hamidi, R., Ghosh, D.

    Published 2019
    “…However, there are some limitations in the performance of these tools, as the algorithms are dependent on the seismic survey parameters, quality of the data and its existing patterns, and geology of the study area. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Image segmentation method for boundary detection of breast thermography using random walkers by Moghbel, Mehrdad

    Published 2013
    “…In breast thermography diagnostic, proper detection and segmentation of the areola area as well as detection of breast boundaries present the biggest challenge. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    HEp-2 cell images classification based on statistical texture analysis and fuzzy logic by Jamil, N.F.B., Faye, I., May, Z.

    Published 2014
    “…This paper proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi by Mohadi, Masnizah

    Published 2005
    “…The useful features of information that was extracted from the handwritten character images are the edges of the character using Sobel Edge Detection Method. As a result of this project, it is proven that the backpropagation algorithm can be used for recognizing handwritten characters and recognition tasks depends highly on how the data was preprocessed and the network parameter itself.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network by Sivarao, Subramonian

    Published 2009
    “…On the other hand, when we use computers to reduce uncertainty, the computer itself can become an expert in a specific field through a variety of methods. One such method is machine learning, which involves computer algorithm to capture hidden knowledge from data. …”
    Get full text
    Get full text
    Article
  20. 20

    Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani by Ghani, Mazuraini

    Published 2005
    “…In this project, the suitable method of segmentation is local adaptive threshold. …”
    Get full text
    Get full text
    Thesis