Search Results - (( pattern detection method algorithm ) OR ( using simulation based algorithm ))

Refine Results
  1. 1

    Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI by Toh, Han Yaung

    Published 2019
    “…The purpose of this research is to develop a tilt sensing device based on moiré fringe pattern theory for landslide monitoring using Raspberry Pi. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  5. 5

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…In this paper, a â��butterflyâ�� shape derived from the manipulation of the standard PV and OP data, which is more robust towards different loop dynamics, is developed for stiction detection. This simple model-free butterfly shape-based detection (BSD) method uses Stenman's one parameter stiction model, which results in a distinctive â��butterflyâ�� pattern in the presence of stiction. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The finalized configuration that resulted in the best response was adopted and used to collect data for training and classifying the gait phase using pattern recognition method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Embedded wearable EEG seizure detection in ambulatory state by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…This gives an enhanced advantage over the existing EEG based seizure detection systems due to their complex pattern classification methodologies. …”
    Get full text
    Get full text
    Article
  10. 10

    A coded aperture-based 3D SPECT imaging system for early breast cancer detection by Hussain, Khalid

    Published 2023
    “…The proposed CA-based SPECT camera employs a mosaic MURA mask and antimask combined with the Maximum Likelihood Expectation Maximization (MLEM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Effective source number enumeration approach under small snapshot numbers by Ge, Shengguo

    Published 2024
    “…Experimental results show that the SEMD-based method performs significantly better than the traditional signal source number estimation algorithm in these complex environments, especially under a small number of snapshots, the SEMD method can still maintain a high estimation accuracy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Fuzzy Platform for Embedded Wearable EEG Seizure Detection in Ambulatory State by Shakir, Mohamed, Malik, Aamir Saeed, Kamel , Nidal, Qidwai, Uvais

    Published 2014
    “…This paper describes a classification method is presented using an Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…However, the current research state is unsatisfactory, especially in terms of structural design, robot system and the robot control method. In this research, an EMG controlled 3D printed robot hand prototype with improved features and advance hand posture classification method based on EMG signal pattern were proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…Plots of survival distribution function against failure time are used to examine the predicted survival patterns for the two types of failures. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  18. 18

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
    Get full text
    Get full text
    Thesis