Search Results - (( sequence extraction method algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…Based on the protein sequence datasets obtained from PISCES database, they found iii that the R-HCSVM performs outstanding result in predicting protein local structure from a given protein subsequence compared to other methods. …”
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  9. 9

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Computational Technique for an Efficient Classification of Protein Sequences With Distance-Based Sequence Encoding Algorithm by Iqbal, M.J., Faye, I., Said, A.M.D., Samir, B.B.

    Published 2017
    “…The major problems in classifying protein sequences into existing families/superfamilies are the following: the selection of a suitable sequence encoding method, the extraction of an optimized subset of features that possesses significant discriminatory information, and the adaptation of an appropriate learning algorithm that classifies protein sequences with higher classification accuracy. …”
    Get full text
    Get full text
    Article
  11. 11

    SOMEA: self-organizing map based extraction algorithm for DNA motif identification with heterogeneous model by Lee, Nung Kion, Wang, Dianhui

    Published 2011
    “…This assumption has some limitations because both sequence signals have distinct properties. Results: This paper aims to develop a Self-Organizing Map (SOM) based clustering algorithm for extracting binding sites in DNA sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Malignant transformation of benign thyroid nodule is caused by prolonged H2O2 insult that interfered with the STAT3 pathway? by Lee, Ching Chin, Abdullah, Mardiaty Iryani, Mat Junit, Sarni, Ng, Khoon Leong, Wong, Sing Ying, Ramli, Nur Siti Fatimah, Hashim, Onn

    Published 2016
    “…Whole-exome capture sequencing of extracted DNA from the PTC tissue revealed mutations of 1799 T>A (p.V600E) and c.353 G>A (p.R118Q) in the V-Raf Murine Sarcoma Viral Oncogene Homolog B (BRAF) and the Thyrotropin-Releasing Hormone (TRH) genes, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…This problem is addressed by proposing an accurate and robust centerline extraction method. Starting at each detected seed point, the centerline extraction method utilizes eigenvalues and eigenvectors of Hessian matrix for the pixels located on a semi-circular scanning profile for robust estimation of the next centerline point. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Spectral texture segmentation of Magnetic Resonance Imaging (MRI) brain images for glioma brain tumour detection / Rosniza Roslan by Roslan, Rosniza

    Published 2013
    “…A new double thresholding algorithm and a fully automated multiple seed points selection algorithm that works on all three MRI image sequences are also proposed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
    Get full text
    Article
  20. 20

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise