Search Results - (( user evaluation path algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria by Ting, Kien Hua, Noraini Abdullah

    Published 2018
    “…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    The Effect of Rainfall on the UAV Placement for 5G Spectrum in Malaysia by Shalaby A.M., Othman N.S.

    Published 2023
    “…The problem of finding the UAV 3D placement is formulated with the objective to minimize the total path loss between the UAV and all users. The problem is solved by invoking two algorithms, namely Particle Swarm Optimization (PSO) and Gradient Descent (GD) algorithms. …”
    Article
  7. 7

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  9. 9

    AUTOMATED GUIDED ROBOT (AGR) by Abd Rahim, Mohd Azlan Shah

    Published 2007
    “…Compared to manual mobile robots, AGRs require sensors and control systems that generate feedback for the re-evaluation of an unexpected situation and to detect obstacles in the path the AGR is required to follow. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios by Sukeran, Lukmanhakim, Habaebi, Mohamed Hadi, Zyoud, Al-Hareth, Musse, Mohamud Ahmed, Hameed, Shihab A., Azman, Amelia Wong, Islam, Md. Rafiqul

    Published 2014
    “…While some scheduling algorithm take the moderate path but still be lacking especially in Edge Cell User Throughput necessitating the use of Relays or femtocells.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The first stage is to apply reverse engineering method to obtain the specific patterns of individual jammers. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Swarm negative selection algorithm for electroencephalogram signals classification by Sahel Ba-Karait, Nasser Omer, Shamsuddin, Siti Mariyam, Sudirman, Rubita

    Published 2009
    “…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
    Get full text
    Article
  18. 18

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The performance of the proposed routing algorithm is evaluated utilizing MATLAB. The assessment results indicate that it can find the forwarding path with comparatively low cost in the premise of ensuring security and has minimized the average energy consumption by nearly 50% even as the number of nodes has increased, when compared with the traditional ACO algorithm, an existing ant colony based routing algorithm and a current routing protocol for IoT.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20