Search Results - (( pattern detection based algorithm ) OR ( using solution learning algorithm ))

Refine Results
  1. 1

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Underwater Image Recognition using Machine Learning by Divya, N.K., Manjula, Sanjay Koti, Priyadarshini, S

    Published 2024
    “…A Convolutional Neural Network (CNN) is a type of a deep learned an algorithm that has been created for image processing when using convolutional layers to automatically and in a hierarchical way learn features from the input images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study by Daru, April Firman, Hirzan, Alauddin Maulana, Mahmod Attar Bashi, Zainab Senan, Fanani, Fajriannoor

    Published 2025
    “…To address this limitation, the present study proposes a self-learning model using reinforcement learning techniques, specifically the Q-Learning algorithm, to classify network intrusions based on learned behavioural patterns autonomously. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Effective source number enumeration approach under small snapshot numbers by Ge, Shengguo

    Published 2024
    “…This study also makes a significant contribution to data science by providing a comprehensive method for estimating the number of signal sources, which is integrated with a machine learning model. This method overcomes the limitations of traditional methods in complex environments by combining signal processing problems with pattern recognition problems, significantly improves the accuracy of data analysis in complex environments, and provides an innovative solution for signal processing and pattern recognition in data science.…”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  11. 11

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  12. 12

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Wifi-based location-independent human activity recognition and localization using deep learning by Abuhoureyah, Fahd Saad Amed

    Published 2024
    “…A trajectory mapping approach using CSI-Triangulation with deep learning is proposed to refine the localization capabilities of WiFi-based HAR, offering an accurate and robust solution for localization in diverse real-world scenarios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis by Kabir Ahmad, Farzana, Kamaruddin, Siti Sakira, Yusof, Yuhanis, Yusoff, Nooraini

    Published 2021
    “…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
    Get full text
    Get full text
    Monograph
  15. 15

    High impedance fault detection and identification based on pattern recognition of phase displacement computation by Ali, Mohd Syukri, Bakar, Ab Halim Abu, Tan, Chia Kwang, Arof, Hamzah, Mokhlis, Hazlie

    Published 2018
    “…This paper proposes a new algorithm for high-impedance-fault (HIF) detection based on phase displacement computation (PDC). …”
    Get full text
    Get full text
    Article
  16. 16

    Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI by Toh, Han Yaung

    Published 2019
    “…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An early warning system for students at risk using supervised machine learning by Yam, Zheng Hong, Mohd Norshahriel, Abd Rani, Nabilah Filzah, Mohd Radzuan, Lim, Huay Yen, Sarasvathi, Nagalingam

    Published 2024
    “…The main objective of this study is to create an early warning system for educators to use in educational institutions. For that, this study will perform a study of the current issues, factors, and solutions in education student’s data, determine the supervised machine learning algorithms, compare which model is the best predict the students’ performances, develop an early warning system for the educators to make an early decision in order to assist and consult the at-risk students, and finally conduct testing and evaluation of the system. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20