Search Results - (( pattern detection method algorithm ) OR ( data visualization system algorithm ))
Search alternatives:
- visualization system »
- data visualization »
- pattern detection »
- method algorithm »
- system algorithm »
-
1
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Detection of in-car-abandoned children via deep learning algorithm / Mohd Farhan Mohd Pauzi
Published 2022“…This problem occurs due to lacking of existing system in detecting children image in a car. Therefore, this study aims to detect the existence of "in-car-abandoned children" using deep learning algorithm. …”
Get full text
Get full text
Thesis -
3
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
4
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…It does not simply fit data to a chart to visualize an algorithm, there is no main data set. …”
Get full text
Get full text
Get full text
Article -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
-
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
10
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
11
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Therefore, a progressive web-based information retrieval visualization system that utilizes Term Frequency-Inverse Document Frequency (TFIDF) algorithm and data visualization are suggested to solve these problems. …”
Get full text
Get full text
Thesis -
13
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
Get full text
Get full text
Thesis -
14
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
Get full text
Get full text
Get full text
Article -
15
Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm
Published 2019“…Viola-Jones algorithm can be categorized as one of an established and effective method (feature-based approach) for detecting face. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Wifi-based location-independent human activity recognition and localization using deep learning
Published 2024“…Second, Multi-head Attention Mechanism Networks capture intricate patterns in Channel State Information (CSI) data, enhancing recognition accuracy for human activities detected through WiFi signals. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
18
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Visualizations used in the system are circular bar plot, word cloud and bar chart where each visualization conveys different purpose. …”
Get full text
Get full text
Thesis -
19
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
20
