Search Results - (( evaluate information detection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Online fake news detection algorithm by Sirajudeen, Sakeena M, A. Azmi, Nur Fatihah, Abubakar, Adamu

    Published 2017
    “…Due to the difficulty in preventing and evaluating what does fake news contain prior to publishing it online, if an algorithm is known for detecting fake news, then spreading online fake news wouldn’t exist in the first place, lead this paper to presents an evaluation of the effectiveness of algorithm(s), able to detect and filter to reasonable degree of accuracy what constitute an online fake news. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images by Elaraby, Ahmed, Al-Ameen, Zohair

    Published 2022
    “…Therefore, a new multi-phase algorithm that depends on information theory is introduced in this article to detect the edges of aerial images adequately in a fully automatic manner. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…Furthermore, the taxonomy was used to evaluate the most recent machine learning algorithm and analysis. …”
    Article
  11. 11

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    An optimal mesh algorithm for remote protein homology detection by M. Abdullah, Firdaus, M. Othman, Razib, Kasim, Shahreen, Hashim, Rathiah, Hassan, Rohayanti, Asmuni, Hishammuddin, Taliba, Jumail

    Published 2011
    “…Therefore, this paper deals with remote protein homology detection via assessing the impact of using structural information on protein multiple alignments over sequence information. …”
    Get full text
    Get full text
    Article
  14. 14

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…An ensemble feature selection method has been proposed in this paper to detect web spam. Content features of standard dataset of WEBSPAM-UK2007 are used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
    Get full text
    Get full text
    Research Reports
  18. 18

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The evaluation results showed that the Improved AKF algorithm achieved better compression ratio and retained sufficient information in the extracted action key frames under different testing video shots. …”
    Get full text
    Get full text
    Article
  19. 19

    Extremal region selection for MSER detection in food recognition by Razali, Mohd Norhisham, Manshor, Noridayu, Abdul Halin, Alfian, Mustapha, Norwati, Yaakob, Razali

    Published 2021
    “…Therefore, this research proposes an Extremal Region Selection (ERS) algorithm to improve MSER detection by reducing the number of irrelevant extremal regions by using unsupervised learning based on the k-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20