Search Results - model ((((replication algorithm) OR (recognition algorithm))) OR (detection algorithm))
Search alternatives:
- replication algorithm »
- recognition algorithm »
-
1
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The definition includes processing of an image in which handwritten letters or numbers exist with the term handwriting recognition. The practical applications of handwriting recognition in many of the current real-world applications rely on the processing of sequential texts, where the language must be detected with efficiency, suggesting the development of a flexible handwriting recognition model. …”
Get full text
Get full text
Thesis -
2
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
3
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…Then, GA and HS algorithms are used as recognition-based segmentation phase for text and character recognition respectively. …”
Get full text
Get full text
Article -
4
Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks
Published 2025“…The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
Get full text
Get full text
Get full text
Article -
5
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
Get full text
Get full text
Get full text
Thesis -
6
Speech Signal Endpoint Detection Using Hidden Markov Models
Published 2006“…This paper discusses a robust algorithm for the detection of speech and silence segments in an input speech signal based on Hidden Markov Models…”
Get full text
Get full text
Article -
7
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
8
Fraud detection in telecommunication industry using Gaussian mixed model
Published 2013“…In this article, we propose a new fraud detection algorithm using Gaussian mixed model (GMM), a probabilistic model successfully used in speech recognition problem. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
The impact of executive function and aerobic exercise recognition in obese children under deep learning
Published 2025“…Initially, a motion recognition model based on STN and Lucas–Kanade optical flow algorithm optimization was constructed. …”
Get full text
Get full text
Article -
11
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…This study proposes the improvement of feature representation by using Maximally Stable Extremal Region (MSER) detector in Bag of Features (BoF) model which incorporates an interest points detection and selection, and fuzzy encoding for food recognition. …”
Get full text
Get full text
Thesis -
12
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article -
13
Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM)
Published 2018“…Precise and strong location of trait point is a complicated and difficult issue in face recognition. Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Neural network algorithm-based fall detection modelling
Published 2020“…However, the improvement of model accuracy is still needed. This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
17
The performance of expectation maximization (EM) algorithm in Gaussian Mixed Models (GMM)
Published 2009“…In this paper, the performance of the said algorithm in finding the Maximum Likelihood for the Gaussian Mixed Models (GMM), a probabilistic model normally used in fraud detection and recognizing a person’s voice in speech recognition field, is shown and discussed. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper
