Search Results - (( based detection method algorithm ) OR ( using factorization machine algorithm ))
Search alternatives:
- using factorization »
- machine algorithm »
- method algorithm »
- based detection »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
3
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
4
An Embedded Machine Learning-Based Spoiled Leftover Food Detection Device for Multiclass Classification
Published 2024“…After five days of storage, the freshness of cooked leftovers was evaluated using an electronic nose combined with machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…As a result, the computational cost is reduced in the subsequent stages. Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. …”
Get full text
Get full text
Get full text
Article -
6
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
7
Machine Learning Approaches to Advanced Outlier Detection in Psychological Datasets
Published 2025“…Due to their complex nature, such datasets demand robust analytical methods. To this end, we employed three sophisticated algorithms: local outlier factor (LOF), one-class support vector machine (OCSVM), and isolation forest (IF). …”
Article -
8
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
9
Hybrid sampling and random forest machine learning approach for software detect prediction
Published 2019“…Cross validation is used to remove overriding problem. Scikit-learn library is used for machine learning algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Predictive Modelling of Stroke Occurrence among Patients using Machine Learning
Published 2023“…This study proposes a machine learning-based approach to predict the likelihood of stroke among patients. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Machine Learning-Based Stress Level Detection from EEG Signals
Published 2021“…This paper presented a system to detect the stress level from the EEG signals using machine learning algorithms. The proposed method, at first, removed physiological noises from the EEG signal applying a band-pass FIR filter. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
Get full text
Get full text
Thesis -
13
-
14
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
Article -
15
-
16
SMSAD: a framework for spam message and spam account detection
Published 2019“…However, the traditional content-based methods for spam detection degraded in performance due to many factors. …”
Get full text
Get full text
Article -
17
Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS
Published 2019“…This is based on highresolution Light Detection and Ranging (LiDAR) techniques both airborne and terrestrial (ALS and TLS). …”
Get full text
Get full text
Thesis -
18
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…Existing content-based methods for spam detection degraded in performance due to many factors. …”
Get full text
Get full text
Get full text
Thesis -
19
Smart Microgrid approach for Distributed power generation of renewable energy
Published 2021“…The Faulty Location Detection (FLD) process is centered by wavelet trigger signal and mathematical morphology algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Assessment of near-infrared and mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm plantation
Published 2013“…The limitations of current detection technique have led to an interest in developing alternative field-based methods that can be used for rapid diagnosis of this disease. …”
Get full text
Get full text
Thesis
