Search Results - (( based detection method algorithm ) OR ( pattern interactive learning algorithm ))

Refine Results
  1. 1

    Machine Learning Based Detection for Compromised Accounts on Social Media Networks by K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali

    Published 2025
    “…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Mean of correlation method for optimization of affective states detection in children by Rusli, Nazreen, Sidek, Shahrul Na'im, Md Yusuf, Hazlina, Ishak, Nor Izzati

    Published 2018
    “…Result from the fine k-NN classifier obtained promises the efficacy of the proposed approach to be applied in our future work in human–robot interaction for autistic children learning and training.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Wifi-based location-independent human activity recognition and localization using deep learning by Abuhoureyah, Fahd Saad Amed

    Published 2024
    “…Detecting human activities holds paramount significance across diverse domains, encompassing healthcare, security, autonomous driving, and human-computer interaction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Pattern classification of human interactions from videos / Muhsin Abdul Mohammed by Muhsin , Abdul Mohammed

    Published 2018
    “…In order to build a classifier capable of achieving this task, the machine learning model needs to be able to learn spatial and temporal patterns from the videos. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparative study of machine learning algorithms in data classification by Tan, Kai Jun

    Published 2025
    “…This research conducts a comparative study of various machine learning algorithms for dataset classification to identify the most accurate and reliable classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20