Search Results - (( based optimization system algorithm ) OR ( pattern detection system algorithm ))

Refine Results
  1. 1

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Classification of diabetic retinopathy clinical features using image enhancement technique and convolutional neural network / Abdul Hafiz Abu Samah by Abu Samah, Abdul Hafiz

    Published 2021
    “…In general, this thesis introduces an automated machine learning algorithm for detecting diabetic retinopathy (DR) in fundus images. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…These analyses provide nuanced insights into system operational dynamics and efficiency. Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq by Uzair , Ishtiaq

    Published 2024
    “…Combining Local Binary Patterns (LBP) based texture features and deep learning features resulted in the creation of the fused features vector which was then optimized using Binary Dragonfly Algorithm (BDA) and Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    IoT-Enabled Waste Tracking and Recycling Optimization : Enhancing Sustainable Waste Management by Eugine Teh, Yin Jie, Chee Soon, Chong, Rozaimi, Ghazali, Hazriq Izzuan, Jaafar, Muhamad Fadli, Ghani, Howe Cheng, Teng, Nur Farhanah, Zulkipli, Siaw Hong, Liew

    Published 2025
    “…Advanced data preprocessing, such as augmentation and normalization, ensures robust model training, while optimized algorithms guide waste sorting based on classification results. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  16. 16

    Smart waste management system with IoT monitoring by Kalitazan, Sachein, Muniswaran, Suvarshan, Velan, Sheshan, Muniswaran, Suvathithan, Shah, Dhanesh

    Published 2023
    “…Through advanced data analytics and machine learning algorithms, the platform predicts waste accumulation patterns, optimizes collection routes, schedules pickups based on fill-level data, and detects any abnormal conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Potential issues in novel computational research: artificial immune systems by Iqbal, Anjum, Maarof, Mohd. Aizaini

    Published 2003
    “…Recent trends in computational research show the significance of computation-based biological research, for example, bioinformatics and system biology, and biologically inspired computational research, which includes genetic algorithms, artificial neural networks, and evolutionary programming. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Scalability and performance in duplicate detection : relational vs. graph database by Muhammad Farhad, Khaharruddin

    Published 2023
    “…This approach enables the discovery of intricate patterns and the management of vast datasets. This study assesses scalability and algorithms performance available on prevalent graph database systems for identifying duplicate customer data within these databases. …”
    Get full text
    Get full text
    Undergraduates Project Papers