Search Results - (( pattern detection method algorithm ) OR ( based evaluation using algorithm ))
Search alternatives:
- pattern detection »
- method algorithm »
- based evaluation »
- evaluation using »
- using algorithm »
-
1
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
Get full text
Get full text
Thesis -
5
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
6
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…Therefore, to overcome the causes of effected accuracy, new Stereo Matching Algorithm (SMA) based on Adaptive Weighted Bilateral Filter (AWBF) was introduced together with characterize the SMA based on quantitative and qualitative measurements and produced SMA performance were evaluate using standard taxonomy of SM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
8
Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems
Published 2025“…Sensor failure, environmental changes, or bad weather can lead to the emergence of abnormal data, which can affect the decision-making process and may have disastrous consequences. Based on the above problems, this study addresses this challenge by proposing a hybrid anomaly detection model (called CAE-RF) that combines convolutional autoencoders and random forest algorithms to achieve efficient and accurate identification of abnormal data patterns to improve the safety of autonomous driving systems. …”
Get full text
Get full text
Get full text
Article -
9
Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel
Published 2024“…Several imaging, computer vision, and pattern recognition algorithms are employed to describe five dermoscopic features. …”
Get full text
Get full text
Get full text
Thesis -
10
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
Get full text
Get full text
Get full text
Article -
11
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
12
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
13
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The prototype is evaluated based on distance between initial position and selected marble position. …”
Get full text
Get full text
Thesis -
14
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
16
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The more the algorithm use in a project the better performance will be in result.…”
Get full text
Get full text
Thesis -
17
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…In this thesis, the accuracy of the proposed algorithm was evaluated using two standard online benchmarking database systems. …”
Get full text
Get full text
Get full text
Thesis -
18
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
Get full text
Get full text
Get full text
Article -
19
Particle track finding using hough transform in a central drift chamber detector / Khasmidatul Akma Mohamed Kamal Azmi
Published 2022“…The assessment of charged particle track findings have improved significantly. The method of the Hough Transform became an iconic method to trace and identify the pattern of the charged track in the HEP based on the evaluation of the track finding in the cloud chamber experiment. …”
Get full text
Get full text
Get full text
Thesis -
20
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…The three main objectives are: (i) to develop a malware RGB image-based dataset and classifier using a parallel CNN (PCNN), (ii) to develop an enhanced parallel deep learning (EPDL) model for malware detection (MD) and build a response system (RS) by applying PCNN, and (iii) to evaluate the developed model with previous studies based on the accuracy rate. …”
thesis::doctoral thesis
