Search Results - (( pattern detection method algorithm ) OR ( based solution learning algorithm ))
Search alternatives:
- learning algorithm »
- pattern detection »
- solution learning »
- method algorithm »
- based solution »
-
1
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
Get full text
Get full text
Get full text
Article -
5
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…A number of researchers keep on proposing various alternative framework consisting detection methods day by days in combating activities such as single classification and rule based approach. …”
Get full text
Get full text
Get full text
Technical Report -
6
Effective source number enumeration approach under small snapshot numbers
Published 2024“…Experimental results show that the SEMD-based method performs significantly better than the traditional signal source number estimation algorithm in these complex environments, especially under a small number of snapshots, the SEMD method can still maintain a high estimation accuracy. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Wifi-based location-independent human activity recognition and localization using deep learning
Published 2024“…A trajectory mapping approach using CSI-Triangulation with deep learning is proposed to refine the localization capabilities of WiFi-based HAR, offering an accurate and robust solution for localization in diverse real-world scenarios. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
12
-
13
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
14
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…Firstly, an architecture for the clustering ensemble based on incremental genetic-based algorithms is proposed consisting of two phases: (i) to produce cluster partitions as initial populations, (ii) to combine cluster partitions and to generate final clustering solution by incremental genetic based clustering ensemble learning algorithm. …”
Get full text
Get full text
Thesis -
15
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
16
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Nonetheless, OBL-based solutions often consider one particular direction of the opposition. …”
Get full text
Get full text
Thesis -
18
Enhanced Adaptive Confidence-Based Q Routing Algorithms For Network Traffic
Published 2004“…These two adaptive routing algorithms enhance the existing Confidence-based Q (CQ) and Confidence-based Dual Reinforcement Q (CDRQ) Routing Algorithms. …”
Get full text
Get full text
Thesis -
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
Get full text
Get full text
Thesis -
20
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
Get full text
Get full text
Get full text
Article
