Search Results - (( based detection method algorithm ) OR ( using factorization machine algorithm ))

Refine Results
  1. 1

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Embedded Machine Learning-Based Spoiled Leftover Food Detection Device for Multiclass Classification by Wan Azman,, Wan Nur Fadhlina Syamimi, Ku Azir, Ku Nurul Fazira, Mohd Khairuddin, Adam

    Published 2024
    “…After five days of storage, the freshness of cooked leftovers was evaluated using an electronic nose combined with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…As a result, the computational cost is reduced in the subsequent stages. Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Machine Learning Approaches to Advanced Outlier Detection in Psychological Datasets by Abri K.Al., Sidhu M.S.

    Published 2025
    “…Due to their complex nature, such datasets demand robust analytical methods. To this end, we employed three sophisticated algorithms: local outlier factor (LOF), one-class support vector machine (OCSVM), and isolation forest (IF). …”
    Article
  8. 8

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Predictive Modelling of Stroke Occurrence among Patients using Machine Learning by Sures, Narayasamy, Thilagamalar, Maniam

    Published 2023
    “…This study proposes a machine learning-based approach to predict the likelihood of stroke among patients. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Machine Learning-Based Stress Level Detection from EEG Signals by Nirabi, Ali, Abd Rhman, Faridah, Habaebi, Mohamed Hadi, Sidek, Khairul Azami, Yusoff, Siti Hajar

    Published 2021
    “…This paper presented a system to detect the stress level from the EEG signals using machine learning algorithms. The proposed method, at first, removed physiological noises from the EEG signal applying a band-pass FIR filter. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
    Article
  15. 15
  16. 16

    SMSAD: a framework for spam message and spam account detection by Adewole, Kayode Sakariyah, Anuar, Nor Badrul, Kamsin, Amirrudin, Sangaiah, Arun Kumar

    Published 2019
    “…However, the traditional content-based methods for spam detection degraded in performance due to many factors. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…This is based on highresolution Light Detection and Ranging (LiDAR) techniques both airborne and terrestrial (ALS and TLS). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…Existing content-based methods for spam detection degraded in performance due to many factors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Smart Microgrid approach for Distributed power generation of renewable energy by Khushi, Farha, Motakabber, S. M. A., Ahmed Hamida, Belal, Azman, Amelia Wong, Bhattacharjee, Amit

    Published 2021
    “…The Faulty Location Detection (FLD) process is centered by wavelet trigger signal and mathematical morphology algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Assessment of near-infrared and mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm plantation by Liaghat, Shohreh

    Published 2013
    “…The limitations of current detection technique have led to an interest in developing alternative field-based methods that can be used for rapid diagnosis of this disease. …”
    Get full text
    Get full text
    Thesis