Search Results - (( pattern detection method algorithm ) OR ( using solution learning algorithm ))
Search alternatives:
- learning algorithm »
- pattern detection »
- solution learning »
- method algorithm »
- using solution »
-
1
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
2
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
3
Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi
Published 2024“…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
Get full text
Get full text
Student Project -
4
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
5
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…These images are then processed using Yolov7, a state-of-the-art object detection algorithm, to accurately identify and classify surface cracks. …”
Get full text
Get full text
Conference or Workshop Item -
6
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
8
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The goal of this study is to investigate and develop a reliable and accurate method for detecting gait activities on an inclined surface such as stairs using smartphones as the sensing device. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…However, such detection method still lacks in differentiate the malware behaviours and cause the rate of falsely identified rate, i.e., false positive and false negative increased. …”
Get full text
Get full text
Get full text
Article -
11
Effective source number enumeration approach under small snapshot numbers
Published 2024“…This study also makes a significant contribution to data science by providing a comprehensive method for estimating the number of signal sources, which is integrated with a machine learning model. This method overcomes the limitations of traditional methods in complex environments by combining signal processing problems with pattern recognition problems, significantly improves the accuracy of data analysis in complex environments, and provides an innovative solution for signal processing and pattern recognition in data science.…”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
14
-
15
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
16
-
17
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
18
Wifi-based location-independent human activity recognition and localization using deep learning
Published 2024“…A trajectory mapping approach using CSI-Triangulation with deep learning is proposed to refine the localization capabilities of WiFi-based HAR, offering an accurate and robust solution for localization in diverse real-world scenarios. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
20
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
