Search Results - (( pattern detection method algorithm ) OR ( using function a algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  4. 4

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RNN was used to detect patterns present in satellite image. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Analysis of banana plant health using machine learning techniques by Thiagarajan, Joshva Devadas, Kulkarni, Siddharaj Vitthal, Jadhav, Shreyas Anil, Waghe, Ayush Ashish, Raja, S.P., Rajagopal, Sivakumar, Poddar, Harshit, Subramaniam, Shamala

    Published 2024
    “…Moving forward, exploring datasets in video formats for disease detection in banana leaves through tailored machine learning algorithms presents a promising avenue for research.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…In this study, we propose an efficient clustering procedure to identify multiple outliers in the linear functional relationship model using the single linkage algorithm with the Euclidean distance as the similarity measure. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…For this project standardized staining pattern classifier to be designed by using image processing techniques. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…SOM and K-Means are integrated as a clustering algorithm to produce a granular input, while SVM is then used as a classifier. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Face emotion recognition using artificial intelligence techniques by Kartigayan Muthukaruppan

    Published 2008
    “…The acquired images have gone through few preprocessing methods. The edge detection has to be successful even when the intensity of light is uneven. …”
    Get full text
    Thesis
  15. 15

    Personal identification by Keystroke Pattern for login security by Abdullah, Norhayati

    Published 2001
    “…The keystroke rhythm that falls in the behavioral biometric has a unique pattern for each individual. Therefore, these heterogeneous data obtained from normal behavior users can be used to detect intruders in a computer system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real time vein visualization using near-infrared imaging by May, Y. H., Ernawan, Ferda

    Published 2020
    “…OpenCV library is also used for its real-time functionalities. The functionality of the system is evaluated through a series of planned system tests. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…The neural network architecture that can be used to implement a nonlinear vector predictor, including a multilayer perceptron (MLP), and a radial basis function network. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Effective source number enumeration approach under small snapshot numbers by Ge, Shengguo

    Published 2024
    “…To verify the performance of the proposed SEMD method, this study designs a series of experiments, using theoretical data and measured data from a radio frequency anechoic chamber laboratory as research objects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
    Get full text
    Get full text
    Conference or Workshop Item