Search Results - (( pattern orientation learning algorithm ) OR ( java application sensor algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    Implementing case-based reasoning approach to framework documentation by Hajar M.J., Lee S.P.

    Published 2023
    “…During the "revise" and "retain" steps of the CBR, Knuth-Morris-Pratt (KMP) pattern matching algorithm is applied. � 2008 IEEE.…”
    Conference paper
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Analysis of banana plant health using machine learning techniques by Thiagarajan, Joshva Devadas, Kulkarni, Siddharaj Vitthal, Jadhav, Shreyas Anil, Waghe, Ayush Ashish, Raja, S.P., Rajagopal, Sivakumar, Poddar, Harshit, Subramaniam, Shamala

    Published 2024
    “…Automated systems that integrate machine learning and deep learning algorithms have proven to be effective in predicting diseases. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The inertial sensor data was collected from the smartphone at two different positions and two different orientations. The data was trained against 6 machine learning algorithms namely Decision Tree, Logistic Regression, Naive Bayes, Random Forest, Neural Networks and KNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Adaptive Non-Stationary Cardiac Signals Identification using an Augmented MLP Network by Asirvadam , Vijanth Sagayan, McLoone, Sean

    Published 2007
    “…It will be also an ideal case when dealing with ECG signals where the pattern of signals varies as it depends on the condition of patience at very short frame of time.In this paper the recursive learning algorithms is being tested on an Augmented a Multilayer- Perceptron (MLP) or also known as Direct-Link MLP (DMLP) networks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14

    Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining by Dian Sa’adillah Maylawati

    Published 2023
    “…Therefore, the present study aims: (1) to improve Indonesian text summary by enhancing the Sequence of Word (SoW) as text representation using Sequential Pattern Mining (SPM) with PrefixSpan algorithm since the effectiveness of SPM in Indonesian is proven useful for text classification and clustering; (2) to combine SPM and Deep Learning (DeepSPM) in text summarization with Indonesian text, as a result of its superior accuracy when trained with large amounts of data; and (3) to evaluate the readability of Indonesian text summary with several evaluation scenarios. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Zaidi, Nurul Syafiqah, Mubarak Ali, Al-Fahim, Ahmad, Firdaus, Abubakar, Adamu, AlDharhani, Ghassan Saleh, Ab Razak, Mohd Faizal

    Published 2025
    “…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For classification, k-Nearest Neighbours (kNN) with Euclidean distance algorithm is implemented. An enhancement version for kNN algorithm, k-General Nearest Neighbours (kGNN) have been proposed at initial stage. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Improving hand written digit recognition using hybrid feature selection algorithm by Wong, Khye Mun

    Published 2022
    “…In the field of machine learning, handwritten digit recognition was known as one of the crucial problems for pattern recognition and computer vision applications. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Ensemble learning using multi-objective optimisation for arabic handwritten words by Ghadhban, Haitham Qutaiba

    Published 2021
    “…Multi-Objective Ensemble Oriented (MOEO) formulated to control the classifier topology and provide feedback support for changing the classifiers' topology and weights based on the extension of Non-dominated Sorting Genetic Algorithm (NSGA-II). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced faster region-based convolutional neural network for oil palm tree detection by Liu, Xinni

    Published 2021
    “…Hence, this research aims to close the research gaps by exploring the deep learning-based object detection algorithm and the classical convolutional neural network (CNN) to build an automatic deep learning-based oil palm tree detection and counting framework. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item