Search Results - (( pattern detection method algorithm ) OR ( pattern selection based algorithm ))

Refine Results
  1. 1

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
    Get full text
    Article
  4. 4

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  6. 6

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction by Abd Razak, Siti Safwana

    Published 2019
    “…Comparison of this framework continue in some of the state-of-the-arts algorithm in the literature and the results is outperformed based on the proposed algorithm experimental result.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection by Jia, Lu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…For generating an interpretable deep architecture for identifying deep intrusion patterns, this study proposes an approach that combines ANFIS (Adaptive Network-based Fuzzy Inference System) and DT (Decision Tree) for interpreting the deep pattern of intrusion detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…In this research, technique selection is done by doing some literature review to find the best one and also studying about the algorithm of each technique has. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…The prototype is evaluated based on distance between initial position and selected marble position. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…In the second experiment, the detection of the specific type of voice disorders has been carried out through twoclass pattern classification problems. …”
    Get full text
    Thesis
  15. 15
  16. 16

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…The performance of recognition system fIrst depends on the process of getting effIcient features to represent pattern characteristics [1]. There is no algorithm which shows how to select the representation or choose the features [2] so the selection of features will depend on the application. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive feature selection for denial of services (DoS) attack by Yusof, Ahmad Riza'ain, Udzir, Nur Izura, Selamat, Ali, Hamdan, Hazlina, Abdullah @ Selimun, Mohd Taufik

    Published 2017
    “…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The finalized configuration that resulted in the best response was adopted and used to collect data for training and classifying the gait phase using pattern recognition method. The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Spectral Estimation And Supervised Classification Technique For Real Time Electromyography Pattern Recognition by Burhan, Nuradebah

    Published 2018
    “…Electromyography (EMG) signal is a biomedical signal which measures physical activity of human muscle.It has been acknowledged to be widely used in rehabilitation or recovery application system assisting physiotherapist to monitor a patient’s physical strength,function,motion and overall well-being by addressing the underlying physical issues.In application system associated with rehabilitation,a signal processing and classification techniques are implemented to classify EMG signal obtained.For real time application in the rehabilitation, the classification is crucial issue.The success of the signal classification depends on the selection of the features that represent a raw EMG signal in the signal processing.Therefore,a robust and resilient denoising method and spectral estimation technique have been acknowledged as necessary to distinguish and detect the EMG pattern.The present study was undertaken to determine the characteristic of EMG features using denoising method and spectral estimation technique for assessing the EMG pattern based on a supervised classification algorithm.In the study,the combination of time-frequency domain (TFD) and time domain (TD) were identified as the preferred denoising method and spectral estimation techniques.In the first part of study, the recorded EMG signal filtered the contaminated noise by using wavelet transform (WT) approach which implemented discrete wavelet transform (DWT) method of the wavelet-denoising signal. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis