0% found this document useful (0 votes)
4 views

Algorithm Exploration for Your Potential FYP

The document outlines a task for students to explore potential algorithms for their final year project (FYP) by selecting an algorithm, explaining its functionality, identifying the type of data it works with, and providing a real-world example. It suggests various algorithms across different fields such as machine learning, computer vision, natural language processing, and more. The submission deadline for the report is by the end of the lab session.

Uploaded by

2024793147
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Algorithm Exploration for Your Potential FYP

The document outlines a task for students to explore potential algorithms for their final year project (FYP) by selecting an algorithm, explaining its functionality, identifying the type of data it works with, and providing a real-world example. It suggests various algorithms across different fields such as machine learning, computer vision, natural language processing, and more. The submission deadline for the report is by the end of the lab session.

Uploaded by

2024793147
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Algorithm Exploration for Your Potential FYP

Objective: Since some of you have not finalised your project title yet, this task will help you
explore and identify a potential algorithm for your FYP.
Task Instructions:
✅ Pick any algorithm and briefly explain how it works.
✅ Identify one type of data it works with. - (structured, unstructured, images, text, etc.)
✅ Give one real-world example where it’s used.
✅ Submission Deadline - Submit your report by the end of the lab session.
💡 Tip: If you're unsure about a specific project, explore broadly! This exercise will help you
gain a better understanding of algorithms before deciding on your final topic.

Suggested Algorithms for FYP Exploration (only suggestion. you could explore moreeeee,
don't restrict to these options)
1️⃣ Machine Learning & Data Science
🔹 Decision Tree – Works well for classification problems (e.g., diagnosing diseases, student
performance prediction).
🔹 Random Forest – Improves accuracy over a single decision tree (e.g., credit risk
assessment, fraud detection).
🔹 K-Nearest Neighbors (KNN) – Simple but effective for pattern recognition (e.g.,
recommendation systems, handwriting recognition).
🔹 Support Vector Machine (SVM) – Good for high-dimensional classification (e.g., sentiment
analysis, face recognition).
🔹 Naïve Bayes – Works well with text classification (e.g., spam detection, fake news
detection).
🔹 Artificial Neural Networks (ANN) – Used in deep learning applications (e.g., stock price
prediction, autonomous driving).

2️⃣ Computer Vision & Image Processing


🖼 Convolutional Neural Networks (CNN) – Used for image classification and object detection
(e.g., pneumonia detection, facial recognition).
🖼 YOLO (You Only Look Once) – Real-time object detection (e.g., traffic surveillance,
security systems).
🖼 Histogram of Oriented Gradients (HOG) – Used for pedestrian detection and human
activity recognition.
3️⃣ Natural Language Processing (NLP)
📝 Recurrent Neural Networks (RNN) – Great for sequential data (e.g., chatbot responses,
speech-to-text).
📝 Long Short-Term Memory (LSTM) – Works well for text prediction (e.g., machine
translation, next-word prediction).
📝 TF-IDF (Term Frequency-Inverse Document Frequency) – Used for text ranking and
keyword extraction.
📝 BERT (Bidirectional Encoder Representations from Transformers) – Powerful NLP model
(e.g., question answering, document summarization).

4️⃣ Optimization & Metaheuristic Algorithms


⚡ Genetic Algorithm (GA) – Used for optimization problems (e.g., scheduling, route
optimization).
⚡ Particle Swarm Optimization (PSO) – Inspired by swarm intelligence (e.g., hyperparameter
tuning, clustering).
⚡ Ant Colony Optimization (ACO) – Applied in pathfinding and logistics (e.g., shortest route
problems, delivery systems).

5️⃣ Cybersecurity & Cryptography


🔐 RSA (Rivest-Shamir-Adleman) – Public-key cryptography for secure communication.
🔐 AES (Advanced Encryption Standard) – Symmetric encryption for data security.
🔐 SHA-256 (Secure Hash Algorithm) – Used for cryptographic hashing (e.g., blockchain
security).
🔐 Intrusion Detection Systems (IDS) using ML – Anomaly detection for network security.

6️⃣ Data Mining & Big Data


📊 Apriori Algorithm – Used for association rule learning (e.g., market basket analysis).
📊 FP-Growth Algorithm – Faster alternative to Apriori for frequent pattern mining.
📊 K-Means Clustering – Used for customer segmentation, anomaly detection.
📊 DBSCAN (Density-Based Spatial Clustering) – Handles clusters of arbitrary shapes (e.g.,
crime pattern analysis).

7️⃣ IoT & Smart Systems


📡 MQTT Protocol – Lightweight messaging protocol for IoT devices.
📡 Edge Computing Models – Used for real-time data processing in IoT networks.
📡 Fuzzy Logic Systems – Used in decision-making systems (e.g., smart traffic control,
weather prediction).

You might also like