Search Results - (( using simulation method algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
    Get full text
    Thesis
  7. 7

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…In this paper, a â��butterflyâ�� shape derived from the manipulation of the standard PV and OP data, which is more robust towards different loop dynamics, is developed for stiction detection. This simple model-free butterfly shape-based detection (BSD) method uses Stenman's one parameter stiction model, which results in a distinctive â��butterflyâ�� pattern in the presence of stiction. …”
    Get full text
    Get full text
    Article
  8. 8

    Identifying multiple outliers in linear functional relationship model using a robust clustering method by Adilah Abdul Ghapor, Yong Zulina Zubairi, Al Mamun, Sayed Md., Siti Fatimah Hassan, Elayaraja Aruchunan, Nurkhairany Amyra Mokhtar

    Published 2023
    “…Application in real data also shows that the proposed clustering method for this linear functional relationship model successfully detects the outliers, thus suggesting the method’s practicality in real-world problems.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The finalized configuration that resulted in the best response was adopted and used to collect data for training and classifying the gait phase using pattern recognition method. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Effective source number enumeration approach under small snapshot numbers by Ge, Shengguo

    Published 2024
    “…The method first uses the SEMD method to decompose the array signal, decomposing the complex signal into several Intrinsic Mode Functions (IMFs), and then extracts features through these IMFs to estimate the number of signal sources. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…A novel investigation in modelling of groundwater level and quality using Artificial Neural Networks (ANNs) and Adaptive neuro fuzzy inference systems (ANFIS) methods was developed in the study area. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Embedded wearable EEG seizure detection in ambulatory state by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. …”
    Get full text
    Get full text
    Article
  14. 14

    A coded aperture-based 3D SPECT imaging system for early breast cancer detection by Hussain, Khalid

    Published 2023
    “…Instead of a collimator, this study proposes a coded aperture (CA) based SPECT imaging system where a mask is attached to a typical clinical gamma camera. This imaging method investigates different patterns of the Modified Uniformly Redundant Array (MURA) masks and mosaic MURA masks by a simulating point source, planar source, and the 3D realistic anthropomorphic female breast phantom. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Reservoir inflow forecasting with a modified coactive neuro-fuzzy inference system: a case study for a semi-arid region by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Mohd, Nuruol Syuhadaa, Deo, Ravinesh C., El-Shafie, Ahmed

    Published 2018
    “…The modification also aids in constructing an integrated model that is able to not only detect the nonlinearity in the training data but also the wide range of features within the training data records used to simulate the forecasting model. …”
    Get full text
    Get full text
    Article
  16. 16

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…Plots of survival distribution function against failure time are used to examine the predicted survival patterns for the two types of failures. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Fuzzy Platform for Embedded Wearable EEG Seizure Detection in Ambulatory State by Shakir, Mohamed, Malik, Aamir Saeed, Kamel , Nidal, Qidwai, Uvais

    Published 2014
    “…This paper describes a classification method is presented using an Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…However, the current research state is unsatisfactory, especially in terms of structural design, robot system and the robot control method. In this research, an EMG controlled 3D printed robot hand prototype with improved features and advance hand posture classification method based on EMG signal pattern were proposed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis