Search Results - (( based optimisation system algorithm ) OR ( pattern detection learning algorithm ))

Refine Results
  1. 1

    A performance comparison study of pattern recognition systems for volatile organic compounds detection / Emilia Noorsal, Muhammad Khusairi Osman and Norfadzilah Mokhtar by Noorsal, Emilia, Osman, Muhammad Khusairi, Mokhtar, Norfadzilah

    Published 2007
    “…The ANNs that were used in this project were Multilayer Perceptron (MLP), Learning Vector Quantization (LVQ) and Adaptive Network Based Fuzzy Inference System (ANFIS). The types of VOCs used for the classification were Acetone, Benzene, Chloroform, Ethanol and Methanol. …”
    Get full text
    Get full text
    Research Reports
  2. 2

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis by Kabir Ahmad, Farzana, Kamaruddin, Siti Sakira, Yusof, Yuhanis, Yusoff, Nooraini

    Published 2021
    “…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
    Get full text
    Get full text
    Monograph
  4. 4

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
    Get full text
    Get full text
    Article
  5. 5

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. The accuracy of trend prediction above 70 proves the relevancy of EW patterns on stock market data as well as the validity of the algorithm as a tool for detection of such patterns. …”
    Get full text
    Get full text
    Article
  6. 6

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…Three plant system were used in this study. First system is based on the ball and hoop system and second system is based on the DC servo motor. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Modelling of optimal placement and sizing of battery energy storage system using hybrid whale optimization algorithm and artificial immune system for total system losses reduct... by Wong Ling Ai

    Published 2023
    “…Having those said, this study proposes BESS optimisation to reduce the total system losses using modified Whale Optimisation Algorithm (WOA) with high exploration and exploitation features. …”
    text::Thesis
  9. 9

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…Without human input, these algorithms discover patterns or groupings in the data. …”
    Get full text
    Get full text
    Article
  10. 10

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
    Get full text
    Get full text
    Article
  12. 12

    Hybrid evolutionarybarnacles mating optimisation-artificial neural network based technique for solving economic power dispatch planning and operation / Nor Laili Ismail by Ismail, Nor Laili

    Published 2024
    “…In this study, a new optimisation algorithm termed Hybrid Evolutionary-Barnacles Mating Optimisation (HEBMO) was initially formulated to solve optimisation problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Dual-head marking performance optimisation via evolutionary solutions by Koh J., Tiong S.K., Aris I.B., Mahmoud S.

    Published 2023
    “…This paper presents a new approach to optimise the performance of a multi-head marking system in terms of its marking speed This processing method named as MMA (Molecular Marking Optimisation algorithm) will adopt the use of Genetic Algorithm. …”
    Conference paper
  14. 14

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  15. 15
  16. 16
  17. 17
  18. 18

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…The dyslexia handwriting detection prototype demonstrates how machine learning may improve the detect handwriting issues in educational settings. …”
    Get full text
    Get full text
    Thesis
  20. 20

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
    Get full text
    Get full text
    Get full text
    Article