Search Results - (( pattern detection method algorithm ) OR ( peer evaluation methods algorithm ))

Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7 by Rusdinaidi, Saffa Nasuha, Hashim, Khairil Afendy, Ahmad Dahlan, Zaki

    Published 2024
    “…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi by Rusdinadi, Saffa Nasuha

    Published 2024
    “…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction by Abd Razak, Siti Safwana

    Published 2019
    “…Comparison of this framework continue in some of the state-of-the-arts algorithm in the literature and the results is outperformed based on the proposed algorithm experimental result.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin by Hamidi, R., Ghosh, D.

    Published 2019
    “…Next, spectral analysis, as a tool to identify events with different frequency content is used which can detect the patterns related to faulting and fracturing of the subsurface layers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Outbreak detection model based on danger theory by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2014
    “…The model is able to detect new unknown outbreak patterns and can discriminate between outbreak and non-outbreak cases with a consistent high detection rate, high sensitivity, and lower false alarm rate even without a training phase.…”
    Get full text
    Get full text
    Article
  16. 16

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…These two different mining methods are then tested and compared to find out which one produces more accurate valid patterns for the intrusion detection system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING by DEMPI, CHRISTIE BANGI

    Published 2018
    “…This project will analyze the texture feature extraction techniques, select and apply the most appropriate technique to corrosion detection problem. The corrosion pattern is to be classified by applying neural network algorithm. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis