Search Results - (( pattern detection method algorithm ) OR ( data evaluation method algorithm ))

Refine Results
  1. 1

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin by Hamidi, R., Ghosh, D.

    Published 2019
    “…Seismic attributes help interpreters to highlight details focusing on the geological features of interest in seismic data. However, there are some limitations in the performance of these tools, as the algorithms are dependent on the seismic survey parameters, quality of the data and its existing patterns, and geology of the study area. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi by Mohadi, Masnizah

    Published 2005
    “…From this process, 13 data collected are used for training and 6 more are used to train the network in order to evaluate the network's performance. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…The proposed classifier is called Support Vector Genetic Programming Machine, SVGPM. In order to evaluate the performance of SVGPM against current methods in solving imbalanced classification task, three experiments are conducted such as on selected standard class imbalanced benchmark data sets, intrusion detection system (IDS) data set and remote sensing data set. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…The shortest distance is defined as best result. A set of data contains position of marbles is tested for ACO algorithm in the prototype. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Particle track finding using hough transform in a central drift chamber detector / Khasmidatul Akma Mohamed Kamal Azmi by Khasmidatul Akma , Mohamed Kamal Azmi

    Published 2022
    “…The assessment of charged particle track findings have improved significantly. The method of the Hough Transform became an iconic method to trace and identify the pattern of the charged track in the HEP based on the evaluation of the track finding in the cloud chamber experiment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The highest accuracy is 78.33% ofthe 10-fold Cross Validation method are found in data is 80% training and 20% testing when k is equal to 5. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article