Search Results - (( java implementation phase algorithm ) OR ( risk detection method algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  4. 4

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
    Get full text
    Get full text
    Article
  5. 5

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Slope inspection system using image processed by machine learning algorithm to determine risk of slope failure by Mat Shukor, S. H., Abdul Hamid, Syamsul Bahrin, Kasim, N., Ab. Moin, Z.

    Published 2020
    “…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2007
    “…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Slope inspection system: using image processed by machine learning algorithm to determine risk of slope failure by Mat Shukor, Sabril Haziq, Syamsul Bahrin, Abdul Hamid, Kasim, Norhidayu, Ab. Moin, Zuraidah

    Published 2020
    “…The conventional method is inefficient and time-consuming. In this paper, the potential of a machine-learning algorithm to improve the conventional approach in detecting the hazard in a landslide is discussed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…In summary, this study advances the field by delivering an effective, optimized predictive algorithm for early heart disease detection, thereby offering valuable insights that could enhance healthcare outcomes, support proactive cardiovascular risk management, and pave the way for future innovations in personalized medicine…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…Besides, that the project introduces a robust method called trilateration algorithm. Therefore, the proposed trilateration algorithm if implemented will detect and reduce the risk of unauthorized network access in tertiary institutions and save the danger of financial loss. …”
    Get full text
    Get full text
    Book Section
  16. 16

    Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model by Elfaki, Faiz. A. M.

    Published 2000
    “…Unlike the residuals, the perturbation method of Cook's distance and the likelihood distance were effective in the detection of observations that have influenced on the parameter estimates. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Early detection of dengue disease using extreme learning machine by Suhaeri, Suhaeri, Mohd Nawi, Nazri, Fathurahman, Muhamad

    Published 2018
    “…Therefore, the proposed ELM model can be considered as an alternative algorithm to apply for early detection of Dengue disease.…”
    Get full text
    Get full text
    Article
  20. 20