Search Results - (( pattern detection using algorithm ) OR ( java implementation means algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…We focus on the outlier detection and background subtraction on image. This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis by Kabir Ahmad, Farzana, Kamaruddin, Siti Sakira, Yusof, Yuhanis, Yusoff, Nooraini

    Published 2021
    “…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI by Toh, Han Yaung

    Published 2019
    “…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    High impedance fault detection and identification based on pattern recognition of phase displacement computation by Ali, Mohd Syukri, Bakar, Ab Halim Abu, Tan, Chia Kwang, Arof, Hamzah, Mokhlis, Hazlie

    Published 2018
    “…There are two stages in this algorithm. In the first stage, the pattern of the PDC is analyzed to detect the occurrence of an event. …”
    Get full text
    Get full text
    Article
  14. 14

    Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm by Ahmad Fakhri, Ab. Nasir, Ahmad Shahrizan, Abdul Ghani, Muhammad Aizzat, Zakaria, Anwar, P. P. Abdul Majeed, Ahmad Najmuddin, Ibrahim

    Published 2019
    “…In the empirical experiment by using this algorithm, some region in the image which is supposed to be non-face region is detected as face due to the similarity of human face features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…While the voice pattern classification will be done by using DTW algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…While the voice pattern classification will be done by using DTW algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Evaluation of fall detection classification approaches by Kerdegari, Hamideh, Samsudin, Khairulmizam, Ramli, Abdul Rahman, Ghotoorlar, Saeid Mokaram

    Published 2012
    “…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  20. 20

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
    Get full text
    Get full text
    Thesis