Search Results - (( pattern detection schemes algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis by Kabir Ahmad, Farzana, Kamaruddin, Siti Sakira, Yusof, Yuhanis, Yusoff, Nooraini

    Published 2021
    “…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
    Get full text
    Get full text
    Monograph
  2. 2

    A lightweight graph-based pattern recognition scheme in mobile ad hoc networks. by Raja Mahmood, Raja Azlina, Muhamad Amin, Anang Hudaya, Amir, Amiza, Khan, Asad I.

    Published 2012
    “…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
    Get full text
    Book Section
  3. 3

    A Distributed Event Detection Scheme for Wireless Sensor Networks by Muhamad Amin , Anang Hudaya, Khan, Asad I., Raja Mahmood, Raja Azlina

    Published 2009
    “…We propose a low-computation, distributed, and lightweight event detection scheme in wireless sensor networks, which is adopted from the pattern recognition scheme known as Distributed Hierarchical Graph Neuron. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improved undetected error probability model for JTEC and JTEC-SQED coding schemes by Flayyih, Wameedh Nazar, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Rokhani, Fakhrul Zaman, Ismail, Yehea I.

    Published 2013
    “…This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding result is checked for failures. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Anomaly detection through spatio-temporal context modeling in crowded scenes by Lu, T., Wu, L., Ma, X., Shivakumara, P., Tan, C.L.

    Published 2014
    “…By combining the determinations from the two stages, a weighted scheme is proposed to automatically detect anomaly events from crowded scenes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Efficient and effective automated surveillance agents using kernel tricks by Ahmed, Tarem, Wei, Xianglin, Ahmed, Supriyo, Pathan, Al-Sakib Khan

    Published 2012
    “…In this paper we present three software-based agents built using kernel machines to perform automated, real-time intruder detection in surveillance systems. Kernel machines provide a powerful data mining technique that may be used for pattern matching in the presence of complex data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…These schemes follow a uniform framework,which is based on the detection of feature points which are commonly invariant to Rotation,Scaling and Translation (RST),therefore they naturally accommodate the framework of geometrically robust image watermarking. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Handwriting Recognition Using Artificial Neural Network by Goh , Siew Yin

    Published 2004
    “…This network is trained using the Back-Propagation algorithm to identify similarities and patterns among different handwriting samples. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…The first step is devoted to detecting invisible patches. Further, an efficient color contrast scheme is proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18
  19. 19

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…Traditional rule-based anti-money laundering (AML) systems are static and unable to effectively detect the novel tactics involved in modern money laundering schemes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20