Search Results - (( pattern detection based algorithm ) OR ( using solution using algorithm ))
Search alternatives:
- pattern detection »
- detection based »
- using algorithm »
- using solution »
- solution using »
-
1
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. …”
Get full text
Get full text
Thesis -
2
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In a source searching task, two possible scenarios can occur: source detected and source not detected. In this study, a complete solution to the two scenarios through an adaptive algorithm switching strategy is explored. …”
Get full text
Get full text
Thesis -
3
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…This paper proposed an improved anomaly threshold solution for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability. …”
Get full text
Get full text
Article -
4
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
An improved artificial dendrite cell algorithm for abnormal signal detection
Published 2018“…This paper proposed an improved anomaly threshold solution for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability. …”
Get full text
Get full text
Get full text
Article -
6
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
Get full text
Get full text
Thesis -
7
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
8
Development of shape pattern recognition for fpga-based embbeded object tracking system
Published 2010“…There are lots of algorithms available including the detection of handwriting, moving people, animals and the barcode number. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
10
Underwater Image Recognition using Machine Learning
Published 2024“…It encompasses the procedure for feeding algorithms information to create the algorithms realize patterns in the data and then increase the performance of the algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
12
-
13
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
14
-
15
Data Classification and Its Application in Credit Card Approval
Published 2004“…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
Get full text
Get full text
Final Year Project -
16
-
17
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
18
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
Get full text
Get full text
Get full text
Article -
19
Integrated multichannel Young’s interferometer sensor based on long-range surface plasmon waveguides
Published 2019“…The diverging output beams from the waveguides are overlapped in the far field to form interference patterns which are then post-processed using the fast Fourier transform (FFT) algorithm to extract phase values. …”
Get full text
Get full text
Article -
20
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis
