Search Results - (( developers exploring detection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Wood texture detection with conjugate gradient neural network algorithm by Widyarto, Setyawan, Suryasa, I. Nyoman, Khairul Annuar, Abdullah, Fajarianto, Otto, Mohd Shafry, Mohd Rahim, Priyandoko, Gigih, Budaya, Gilang Anggit

    Published 2017
    “…This project explored fundamental methods to find the factors that can be used in classifying and detecting the type of wood. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
    Get full text
    Get full text
    Article
  8. 8

    Machine learning approach for stress detection based on alpha-beta and theta-beta ratios of EEG signals by Altaf, Hunain, Ibrahim, Siti Noorjannah, Mohd Azmin, Nor Fadhillah, Asnawi, Ani Liza, Walid, Balqis Hanisah, Harun, Noor Hasmiza

    Published 2021
    “…This study will ultimately contribute to society's development with improved robust machine learning algorithm for binary classification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…Face detection has been widely explored over the past few decades. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…The use of linguistic features to detect the sentiment in Twitter tweets are explored. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Comprehensive review of drones collision avoidance schemes: challenges and open issues by Rezaee, Mohammad Reza, Abdul Hamid, Nor Asilah Wati, Hussin, Masnida, Ahmad Zukarnain, Zuriati

    Published 2024
    “…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…So, Self-Adaptive SFM is developed in order to estimate a good quality of interaction forces since it is crucial to achieve better abnormal detection, which represents the behavior of the crowd. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli by Mohamed Rosli, Nurul Fathiah

    Published 2016
    “…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of images segmentation using image thresholder and batch processing technique on the blood smears by Al-Shoukry, Suhad, Zalili, Musa, Amer, Duha, Kareem, Safaa Muhsen

    Published 2022
    “…This work employs image segmentation tools to examine images of thin blood smears data set. The goal is to explore options for a noniterative-based and automated system for detecting parasites in blood smears. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20