Search Results - (( variable detection based algorithm ) OR ( variable extraction learning algorithm ))

Refine Results
  1. 1

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
    Get full text
    Get full text
    Thesis
  2. 2

    ECG-based driving fatigue detection using heart rate variability analysis with mutual information by Halomoan, Junartho, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya, Salman, Muhammad

    Published 2023
    “…In this paper, we propose developments in the feature extraction and feature selection phases in the driving fatigue detection framework. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The RSNN provides a novel methodology for designing nonlinear filters without prior knowledge of the problem domain. The RNN was used to detect patterns present in satellite image. A novel feature extraction algorithm was developed to extract the feature vectors. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm by Acharya, U.R., Faust, O., Molinari, F., Sree, S.V., Junnarkar, S.P., Sudarshan, V.

    Published 2015
    “…These classification algorithms are trained using the features extracted from the patient data in order for them to learn the relationship between the features and the end-result (FLD present or absent). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke by Henry Friday , Nweke

    Published 2019
    “…However, analysis of mobile and wearable sensor data for human activity detection is still very challenging. This is further worsen by the use of single sensors modality and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A hybrid chromaticity-morphological machine learning model to overcome the limit of detecting newcastle disease in experimentally infected chicken within 36 h by Bakar, Mohd Anif A.A., Ker, Pin Jern, Tang, Shirley G.H., Arman Shah, Fatin Nursyaza, Mahlia, T. M.Indra, Baharuddin, Mohd Zafri, Omar, Abdul Rahman

    Published 2025
    “…This work demonstrates a promising methodology in developing machine learning algorithm using hybrid chromaticity-morphological features for early detection of virus-infected chickens, contributing to the goal of a sustainable and healthier planet.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Tree species and aboveground biomass estimation using machine learning, hyperspectral and LiDAR data / Nik Ahmad Faris Nik Effendi by Nik Effendi, Nik Ahmad Faris

    Published 2022
    “…Besides, Artificial Neural Network (ANN) and Random Forest (RF) algorithm was used to predicted the AGB using different combination of variables. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…As the ALOS PALSAR-2 image was evaluated with dual-polarization (HH and HV), each digitized point has two distinct backscatter data with four severity levels (T0 to T3). The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti... by Mohd Sayud, Nur Asikin

    Published 2018
    “…In this study, several models has been created which are from QPS Fledermaus model, BTM model and Slope Variability model. Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…Hazard and Operability Study (HAZOP) is used to support the diagnosis task. The algorithm has been successful in detecting the deviations of each variable by testing the data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Potential norms detection in social agent societies by Mahmoud M.A., Mustapha A., Ahmad M.S., Ahmad A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
    Article
  16. 16

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) by Mahmoud M.A., Ahmad M.S., Ahmad A., Mustapha A., Yusoff M.Z.M., Hamid N.H.A.

    Published 2023
    “…This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
    Short Survey
  19. 19
  20. 20

    Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2010
    “…The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
    Get full text
    Get full text
    Conference or Workshop Item