Search Results - (( pattern detection path algorithm ) OR ( variable active learning algorithm ))
Search alternatives:
- learning algorithm »
- pattern detection »
- active learning »
- detection path »
- path algorithm »
- variable »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
2
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
6
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
7
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
9
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…Deterministic technique will be used to detect failure circuit base on test pattern generation. …”
Get full text
Get full text
Conference or Workshop Item -
10
Examining the potential of machine learning for predicting academic achievement: A systematic review
Published 2023“…Predicting student academic performance is a critical area of education research. Machine learning (ML) algorithms have gained significant popularity in recent years. …”
Get full text
Get full text
Get full text
Article -
11
Examining the potential of machine learning for predicting academic achievement: A systematic review
Published 2023“…Predicting student academic performance is a critical area of education research. Machine learning (ML) algorithms have gained significant popularity in recent years. …”
Get full text
Get full text
Get full text
Article -
12
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
13
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…The performance of ANNs depend on many factors, including the network structure, the selection of activation function, the learning rate of the training algorithm, and initial synaptic weight values, the number of input variables, and the number of units in the hidden layer. …”
Get full text
Get full text
Thesis -
14
Classification of Students' Performance in Computer Programming Course According to Learning Style
Published 2024“…The findings show that that student's good performance in programming courses has a visual, active and sequential learning style.…”
Proceedings Paper -
15
Classifying corporates default and non-default using machine learning Artificial Neural Network: multilayer perceptron / Nur Insyirah Mohamad Radzi, Murni Salina Rosidi and Nur Asy...
Published 2023“…Asset volatility is found to be the most significant independent variable. Therefore, ANN is a machine learning algorithm that uses multiple layers perceptron to solve complex problems and predict analytics.…”
Get full text
Get full text
Student Project -
16
An evolutionary based features construction methods for data summarization approach
Published 2015“…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
Get full text
Get full text
Research Report -
17
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article -
18
Enhancing understanding of programming concepts through physical games
Published 2017“…The activities were conducted involving first and fourth year undergraduate students and Master students in Programming 1 (31 students), Data Structure (6 students), Analysis of Algorithm (12 students) and Advanced Algorithm (22 students) courses respectively. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Characterization of water quality conditions in the Klang River Basin, Malaysia using self organizing map and K-means algorithm
Published 2015“…The self organizing map (SOM) combined with the K-means algorithm arranged the data based on the relationships of 25 variables. …”
Get full text
Get full text
Get full text
Article -
20
