Search Results - (( using function method algorithm ) OR ( pattern detection a algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  4. 4

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RNN was used to detect patterns present in satellite image. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Analysis of banana plant health using machine learning techniques by Thiagarajan, Joshva Devadas, Kulkarni, Siddharaj Vitthal, Jadhav, Shreyas Anil, Waghe, Ayush Ashish, Raja, S.P., Rajagopal, Sivakumar, Poddar, Harshit, Subramaniam, Shamala

    Published 2024
    “…Moving forward, exploring datasets in video formats for disease detection in banana leaves through tailored machine learning algorithms presents a promising avenue for research.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…Heart diseases represent a leading global health concern, underscoring the imperative for innovative strategies in early detection and prevention to effectively mitigate risks and avert sudden fatalities. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…In this study, we propose an efficient clustering procedure to identify multiple outliers in the linear functional relationship model using the single linkage algorithm with the Euclidean distance as the similarity measure. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…For this project standardized staining pattern classifier to be designed by using image processing techniques. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…SOM and K-Means are integrated as a clustering algorithm to produce a granular input, while SVM is then used as a classifier. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…In addition, the classifier is also optimized such that it has a good generalization property. The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Face emotion recognition using artificial intelligence techniques by Kartigayan Muthukaruppan

    Published 2008
    “…The absence of common patterns leads to studies on emotion personalized to an ethnic. …”
    Get full text
    Thesis
  15. 15

    Personal identification by Keystroke Pattern for login security by Abdullah, Norhayati

    Published 2001
    “…The keystroke rhythm that falls in the behavioral biometric has a unique pattern for each individual. Therefore, these heterogeneous data obtained from normal behavior users can be used to detect intruders in a computer system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Real time vein visualization using near-infrared imaging by May, Y. H., Ernawan, Ferda

    Published 2020
    “…OpenCV library is also used for its real-time functionalities. The functionality of the system is evaluated through a series of planned system tests. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…The neural network architecture that can be used to implement a nonlinear vector predictor, including a multilayer perceptron (MLP), and a radial basis function network. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Effective source number enumeration approach under small snapshot numbers by Ge, Shengguo

    Published 2024
    “…The method first uses the SEMD method to decompose the array signal, decomposing the complex signal into several Intrinsic Mode Functions (IMFs), and then extracts features through these IMFs to estimate the number of signal sources. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…This article uses methodology based on chi-squared automatic interaction detection (CHAID), as a multivariate method that has an automatic classification capacity to analyse large numbers of landslide conditioning factors. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…Plots of survival distribution function against failure time are used to examine the predicted survival patterns for the two types of failures. …”
    Get full text
    Get full text
    Thesis