Search Results - (( pattern detection a algorithm ) OR ( using function method algorithm ))
Search alternatives:
- pattern detection »
- method algorithm »
- function method »
- using function »
- detection a »
- a algorithm »
-
1
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. …”
Get full text
Get full text
Get full text
Thesis -
2
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. …”
Get full text
Get full text
Get full text
Article -
3
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
4
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…The RNN was used to detect patterns present in satellite image. …”
Get full text
Get full text
Thesis -
5
EEG-based fatigue detection using binary pattern analysis and KNN algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Analysis of banana plant health using machine learning techniques
Published 2024“…Moving forward, exploring datasets in video formats for disease detection in banana leaves through tailored machine learning algorithms presents a promising avenue for research.…”
Get full text
Get full text
Get full text
Article -
7
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Heart diseases represent a leading global health concern, underscoring the imperative for innovative strategies in early detection and prevention to effectively mitigate risks and avert sudden fatalities. …”
Get full text
Get full text
Get full text
Article -
8
Identifying multiple outliers in linear functional relationship model using a robust clustering method
Published 2023“…In this study, we propose an efficient clustering procedure to identify multiple outliers in the linear functional relationship model using the single linkage algorithm with the Euclidean distance as the similarity measure. …”
Get full text
Get full text
Get full text
Article -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing
Published 2014“…For this project standardized staining pattern classifier to be designed by using image processing techniques. …”
Get full text
Get full text
Final Year Project -
11
A study on component-based technology for development of complex bioinformatics software
Published 2004“…SOM and K-Means are integrated as a clustering algorithm to produce a granular input, while SVM is then used as a classifier. …”
Get full text
Get full text
Monograph -
12
-
13
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
14
Face emotion recognition using artificial intelligence techniques
Published 2008“…The absence of common patterns leads to studies on emotion personalized to an ethnic. …”
Get full text
Thesis -
15
Personal identification by Keystroke Pattern for login security
Published 2001“…The keystroke rhythm that falls in the behavioral biometric has a unique pattern for each individual. Therefore, these heterogeneous data obtained from normal behavior users can be used to detect intruders in a computer system. …”
Get full text
Get full text
Thesis -
16
Real time vein visualization using near-infrared imaging
Published 2020“…OpenCV library is also used for its real-time functionalities. The functionality of the system is evaluated through a series of planned system tests. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…The neural network architecture that can be used to implement a nonlinear vector predictor, including a multilayer perceptron (MLP), and a radial basis function network. …”
Get full text
Get full text
Thesis -
18
Effective source number enumeration approach under small snapshot numbers
Published 2024“…The method first uses the SEMD method to decompose the array signal, decomposing the complex signal into several Intrinsic Mode Functions (IMFs), and then extracts features through these IMFs to estimate the number of signal sources. …”
Get full text
Get full text
Get full text
Thesis -
19
Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration
Published 2014“…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
Get full text
Get full text
Conference or Workshop Item -
20
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…Plots of survival distribution function against failure time are used to examine the predicted survival patterns for the two types of failures. …”
Get full text
Get full text
Thesis
