Search Results - (( develop formerly detection algorithm ) OR ( java binary classification algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design and development of latex mark visual detection system by Chong, Kai Zhe, Zakaria, Azrul Abidin, Mohamed, Hassan, Baharuddin, Mohd Zafri

    Published 2025
    “…The vital parts in developing a highly efficient latex former defect detection model include designing a mechanical frame structure and developing and evaluating a deep learning model. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automated visual defect detection using deep learning by Loh, Xiao

    Published 2022
    “…The main goal of this project is to study and develop various automated defect detection models by utilizing state-of-the-art deep learning segmentation algorithms, including U-Net, Double U-Net, SETR, TransU-Net, TransDAU-Net, CAM and SEAM to perform semantic segmentation in fully supervised and weakly supervised learning manners. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…The former involves very complicated calculations and tedious algorithms, and the latter tend to work poorly. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  8. 8

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of multivariate statistical process monitoring system using multidimensional scalling technique for continuous and batch-based process by Yunus, M. Y. M., Kanthasamy, Ramesh, Fatin Syazwana, Hashim

    Published 2015
    “…This verifies that the new CMDS algorithm is truly reliable. Next, a new statistic has also been introduced particularly in addressing the issue of high false alarm that suffered by the former statistic. …”
    Get full text
    Get full text
    Research Report
  10. 10

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In the experiment, we study the effect of introducing the outlier detection in RAN-LSH. As a result, by introducing the outlier detection, we confirm that the detection accuracy is enhanced on 377$ 3(53867$.$$1781.8781$0,1$+ average over the testing period. …”
    Get full text
    Get full text
    Thesis