Search Results - (( using evaluation method algorithm ) OR ( pattern detection method algorithm ))
Search alternatives:
- evaluation method »
- pattern detection »
- using evaluation »
- method algorithm »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
2
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
6
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…This integration optimizes feature extraction by capturing both spatial and temporal relationships, enhancing the detection of complex network behaviors. Using the NSL-KDD dataset for evaluation, the proposed method demonstrates superior performance compared to conventional algorithms and related deep learning techniques, achieving higher precision, recall, F1 scores and overall accuracy in both binary and multi-class classification tasks. …”
Get full text
Get full text
Get full text
Thesis -
7
Random Undersampling on Imbalance Time Series Data for Anomaly Detection
Published 2023Conference Paper -
8
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
9
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
10
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
11
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article -
12
Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi
Published 2024“…These images are then processed using yolov7, a state-of-the-art object detection algorithm, to accurately identify and classify surface cracks. the study involves the collection of a comprehensive dataset of concrete surfaces with varying crack patterns, pre-processed using Roboflow and Opencv tools to enhance crack features. the annotated dataset is utilized to train and validate the yolov7 model, ensuring high precision which is 96.8% and 90.1% recall in crack detection. the performance of the model is evaluated through metrics such as precision, recall, and f1-score, demonstrating its robustness and reliability in detecting both fine and prominent cracks. …”
Get full text
Get full text
Student Project -
13
Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function
Published 2012“…We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. We evaluate our method in the context of analyzing real world financial statements for identifying deviating performance indicators. …”
Get full text
Get full text
Get full text
Article -
14
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…Activities in this section are, for testing part, 314 words from 2 different speakers are evaluated by using clustering method. WEKA is a set of machine learning algorithm for data mining task. …”
Get full text
Get full text
Thesis -
15
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…Therefore, to overcome the causes of effected accuracy, new Stereo Matching Algorithm (SMA) based on Adaptive Weighted Bilateral Filter (AWBF) was introduced together with characterize the SMA based on quantitative and qualitative measurements and produced SMA performance were evaluate using standard taxonomy of SM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019“…Next, spectral analysis, as a tool to identify events with different frequency content is used which can detect the patterns related to faulting and fracturing of the subsurface layers. …”
Get full text
Get full text
Conference or Workshop Item -
17
Offline handwritten character recognition using backpropagation neural network / Masnizah Mohadi
Published 2005“…This project presents a study on the offline handwritten character recognition using backpropagation algorithm that is one of the training algorithms used in Artificial Neural Network. …”
Get full text
Get full text
Thesis -
18
CORROSION DAMAGE ANALYSIS USING IMAGE PROCESSING
Published 2018“…This project will analyze the texture feature extraction techniques, select and apply the most appropriate technique to corrosion detection problem. The corrosion pattern is to be classified by applying neural network algorithm. …”
Get full text
Get full text
Final Year Project -
19
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
20
Effective mining on large databases for intrusion detection
Published 2014“…Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. …”
Get full text
Get full text
Conference or Workshop Item
