Search Results - (( pattern detection during algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
    Get full text
    Get full text
    Article
  4. 4

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  6. 6

    Anomaly detection through spatio-temporal context modeling in crowded scenes by Lu, T., Wu, L., Ma, X., Shivakumara, P., Tan, C.L.

    Published 2014
    “…The proposed framework essentially turns the anomaly detection process into two parts, namely, motion pattern representation and crowded context modeling. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…This thesis proposes a real time gait phase detection system to control AAFO for rehabilitation and assist ankle motion. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Mouth covered detection for yawn by Mat Ibrahim, Masrullizam, Soraghan, John J., Petropoulakis, Lykorgous

    Published 2013
    “…However, the spontaneous human action to cover the mouth during yawn can prevent such measurements. This paper presents a new technique to detect the covered mouth by employing the Local Binary Pattern (LBP) features. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
    Get full text
    Get full text
    Article
  12. 12

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom, Sampe, Jahariah

    Published 2022
    “…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
    Get full text
    Get full text
    Article
  13. 13

    Pattern Recognition for Human Diseases Classification in Spectral Analysis by Nur Hasshima Hasbi, Abdullah Bade, Fuei, Pien Chee, Muhammad Izzuddin Rumaling

    Published 2022
    “…Pattern recognition is a multidisciplinary area that received more scientific attraction during this period of rapid technological innovation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An improved artificial dendrite cell algorithm for abnormal signal detection by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak, Abdul Wahab, Mohd Helmy

    Published 2018
    “…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Two-factor authentication smart entryway using modified LBPH algorithm by Ayop, Zakiah, Othman, Nur Fadzilah, Anawar, Syarulnaziah, Wan Mohamad Rosdi, Wan Mohamad Hariz, Looi, Wei Hua

    Published 2024
    “…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An adaptive anomaly threshold in artificial dendrite cell algorithm by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2017
    “…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection by Selamat, Nur Asmiza, Md. Ali, Sawal Hamid, Minhad, Khairun Nisa’, Ahmad, Siti Anom

    Published 2022
    “…This article uses a proximity sensor to perform noncontact-based (sensing) chewing activity detection, capturing the temporalis muscle movement during food intake. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…It was observed that, by using the Decision Tree and Random Forest algorithm 100% accuracy was achieved, when the smartphone was placed at the thigh during stair movement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Smartphone aided real-time blood vein detection system by Ahmed, Kazi Istiaque, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2019
    “…Illuminated infrared light in the blood cells of the vein is absorbed due to the manifestation of the Haemoglobin in blood and the IR non-blocking camera can capture the vein patterns in the IR light spectrum. Contrast Limited Adaptive Histogram Equalization (CLAHE) algorithm was used to enhance the pattern of the vein in the Android application developed using OpenCV3. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article