Search Results - (( develop formerly detection algorithm ) OR ( java binary classification algorithm ))
Search alternatives:
- binary classification »
- formerly detection »
- develop »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Design and development of latex mark visual detection system
Published 2025“…The vital parts in developing a highly efficient latex former defect detection model include designing a mechanical frame structure and developing and evaluating a deep learning model. …”
Get full text
Get full text
Get full text
Article -
3
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…For the former, an image processing algorithm was developed to improve or remove noise, adjust the brightness of the captured image, and extract features to identify defects in oil tanks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
Get full text
Get full text
Thesis -
5
Automated visual defect detection using deep learning
Published 2022“…The main goal of this project is to study and develop various automated defect detection models by utilizing state-of-the-art deep learning segmentation algorithms, including U-Net, Double U-Net, SETR, TransU-Net, TransDAU-Net, CAM and SEAM to perform semantic segmentation in fully supervised and weakly supervised learning manners. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…The former involves very complicated calculations and tedious algorithms, and the latter tend to work poorly. …”
Get full text
Get full text
Thesis -
7
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
8
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Development of multivariate statistical process monitoring system using multidimensional scalling technique for continuous and batch-based process
Published 2015“…This verifies that the new CMDS algorithm is truly reliable. Next, a new statistic has also been introduced particularly in addressing the issue of high false alarm that suffered by the former statistic. …”
Get full text
Get full text
Research Report -
10
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 377$ 3(53867$.$$1781.8781$0,1$+ average over the testing period. …”
Get full text
Get full text
Thesis
