Search Results - (( developing confirmation detection algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant by Al-Neami, F. B., Al-Kayiem, Hussain H.

    Published 2008
    “…The recent work presents a new method of fault diagnosis based on artificial neural networks and genetic algorithms. The networking is under development to resolve this problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Predicting pneumonia and region detection from X-Ray images using deep neural network by Sheikh Md, Hanif Hossain, S M, Raju, Ismail, Amelia Ritahani

    Published 2021
    “…The model has achieved an accuracy of 90.6 percent which confirms that the model is effective and can be implemented for the detection of Pneumonia in patients. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  5. 5

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…Results obtained from simulation validate the generated fault syndromes thus confirmed the ability of this algorithm to detect and distinguish between SAFs and TFs. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of mesoscopic imaging system for surface inspection / Moe Win by Moe , Win

    Published 2018
    “…The results obtained are compared with those obtained from optical microscopy to verify the accuracy of detection. For the automatic inspection, defect detection algorithms based on image thresholding are developed and implemented as a statistical approach to identify possible defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Sensing texture using an artificial finger and a data analysis based on the standard deviation by Chappell, Paul H., Muridan, Norasmahan, Mohamad Hanif, N. H. H, Cranny, Andy, White, Neil M.

    Published 2015
    “…The results from the algorithm are confirmed with an analysis of the signals using Fast Fourier Transforms.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Feasibility study of utilising electronic nose to detect BSR disease in oil palm plantation by Marni Azira, Markom

    Published 2010
    “…As a conclusion, this work confirms that it is feasible to utilise the electronic nose and ANNs to detect and discriminate the BSR disease both in the laboratory and in the plantation.…”
    Get full text
    Thesis
  12. 12

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Cassification of breast tumor based on ultrasound images by Perumal, Devendran Pillai

    Published 2009
    “…Next, the filtered images are run through a set of edge detection algorithms which identifies and defines the region of interest. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Translating conventional wisdom on chicken comb color into automated monitoring of disease-infected chicken using chromaticity-based machine learning models by Bakar M.A.A.A., Ker P.J., Tang S.G.H., Baharuddin M.Z., Lee H.J., Omar A.R.

    Published 2024
    “…Bacteria- or virus-infected chicken is conventionally detected by manual observation and confirmed by a laboratory test, which may lead to late detection, significant economic loss, and threaten human health. …”
    Article
  19. 19

    Spear- phishing attack detection using artificial intelligence by Rajkumaradevan, Sanglidevan

    Published 2024
    “…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20