Search Results - ((((((sift algorithm) OR (svm algorithm))) OR (system algorithm))) OR (_ algorithm))

Refine Results
  1. 1

    Phylogenetic tree classification system using machine learning algorithm by Tan, Jia Kae

    Published 2015
    “…A study is conducted to develop an automated phylogenetic tree image classification system by using machine learning algorithm. This study adopted supervised machine learning algorithm which is the Support Vector Machine (SVM) for classification. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Waste classification using support vector machine with SIFT-PCA feature extraction by Puspaningrum, Adita Putri, Endah, Sukmawati Nur, Sasongko, Priyo Sidik, Kusumaningrum, Retno, ., Khadijah, ., Rismiyati, Ernawan, Ferda

    Published 2020
    “…The performance of the SVM classification using SIFT feature is compared with the similar algorithm with SIFT-PCA combined feature. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform by Ooi , Chong Wei

    Published 2015
    “…Experimental results shows that SURF and SIFT are robust algorithm performing stable key point detection. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…Intrusion detection systems (IDSs) are one of the promising tools for protecting data and networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB), decision tree (DT), and support vector machine (SVM) have been used for IDS in the last decades. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Using the bees algorithm to optimise a support vector machine for wood defect classification by Pham, D.T, Muhammad, Zaidi, Mahmuddin, Massudi, Ghanbarzadeh, Afshin, Koc, Ebubekir, Otri, Sameh

    Published 2007
    “…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    AMOR: an adaptive, multimodal architecture for visual object recognition by James Mountstephens

    Published 2014
    “…Reka bentuk seni bina telah dirasmikan secara matematik dan algorithmically dalam bentuk "Pengkelasan'…”
    Get full text
    Get full text
    Research Report
  13. 13

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hand gesture recognition for autism diagnosis using Support Vector Machine (SVM) Algorithm / Muhammad Asyraf Mohamad Zain by Mohamad Zain, Muhammad Asyraf

    Published 2020
    “…To counter this problem, a system has been proposed to detect the hand gesture using one of the machine learning technique which is Support Vector Machine (SVM) Algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system by M. W., Mustafa, H., Shareef, M. H., Sulaiman, S. N., Abd. Khalid, S. R., Abd. Rahim, Omar, Aliman

    Published 2011
    “…This paper proposes a new method to trace the transmission loss in deregulated power system by applying Genetic Algorithm (GA) and Least Squares Support Vector Machine (LS-SVM). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Multispectral palm vein image fusion for contactless palm vein verification system by Soh, Shi Chuan

    Published 2018
    “…The result shows that SIFT algorithm achieved a better recognition rate and extract more information and matching pairs compared to SURF algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone by Saipullah, Khairul Muzzammil

    Published 2013
    “…This paper presents the analysis of real-time object detection method for embedded system particularly the Android smartphone. As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Article
  19. 19

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…IPJAYA in this study was used to update the C and gamma parameters of the support vector machine (SVM). Several experiments were performed on the prominent intrusion ML dataset, where significant enhancements were observed with the suggested ITLBO-IPJAYA-SVM algorithm compared with the classical TLBO and JAYA algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…This paper presents the analysis of real-time object detection method for embedded system, especially the Android smartphone. As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item