Search Results - (( basic detection method algorithm ) OR ( using factorization machine algorithm ))
Search alternatives:
- using factorization »
- machine algorithm »
- method algorithm »
- basic detection »
-
1
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
2
A review of machine vision pose measurement
Published 2024“…Discusses the factors that affect the accuracy and reliability of machine vision pose measurement algorithms. …”
Get full text
Get full text
Get full text
Article -
3
A review of machine vision pose measurement
Published 2024“…Discusses the factors that affect the accuracy and reliability of machine vision pose measurement algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
6
The influence of sentiments in digital currency prediction using hybrid sentiment-based Support Vector Machine with Whale Optimization Algorithm (SVMWOA)
Published 2021“…Support Vector Machine (SVM) technique is used with the Whale Optimization Algorithm (WOA) which is inspired by the swarm optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
8
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
Get full text
Get full text
Thesis -
9
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
10
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
11
Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China
Published 2024“…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
Article -
12
Optimization of chest X-ray exposure factors using machine learning algorithm
Published 2023“…In this study, the chest X-ray exposure factors for 178 patients with different body mass index (BMI) values have been analyzed using the Python Machine Learning algorithm. …”
Get full text
Get full text
Article -
13
Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram
Published 2021“…Therefore, this study aimed to used OBIA method with selected machine learning algorithm to estimate the mangrove age by using Sentinel 2A image. …”
Get full text
Get full text
Thesis -
14
Reverse migration prediction model based on machine learning / Azreen Anuar
Published 2024“…A significant way to minimize the errors is by using a machine learning approach that can predict reverse migration intelligently depending on the tested dataset. …”
Get full text
Get full text
Thesis -
15
Neural Network Multi Layer Perceptron Modeling For Surface Quality Prediction in Laser Machining
Published 2009“…One such method is machine learning, which involves using a computer algorithm to capture hidden knowledge from data. …”
Get full text
Get full text
Book Chapter -
16
Optimization of cutting parameters to minimize tooling cost in high speed turning of SS304 using coated carbide tool using genetic algorithm method
Published 2016“…The experiments were designed using Box Behnken Design (BBD) with three input factors: cutting speed, feeding speed and depth of cut and three machining levels.…”
Get full text
Get full text
Get full text
Article -
17
-
18
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
19
Prediction of life expectancy for Asian population using machine learning ALGORITHMS / Nurul Shahira Pisal, Shuzlina Abdul-Rahman, Mastura Hanafiah and Saidatul Izyanie Kamarudin
Published 2022“…However, studies focusing on the Asian population are limited. This study presents machine learning algorithms for life expectancy based on the Asian population dataset. …”
Get full text
Get full text
Get full text
Article -
20
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis
