Search Results - (( java implication based algorithm ) OR ( teaching detection method algorithm ))

Refine Results
  1. 1

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    The application of suitable sports games for junior high school students based on deep learning and artificial intelligence by Ji, Xueyan, Samsudin, Shamsulariffin, Hassan, Muhammad Zarif, Farizan, Noor Hamzani, Yuan, Yubin, Chen, Wang

    Published 2025
    “…They are obviously lower than those of other algorithms. ST-GCN action detection algorithm based on deep learning and artificial intelligence technology can significantly improve the accuracy of action recognition in junior middle school students’ sports activities, and provide an immediate and accurate feedback mechanism for physical education teaching. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj by Othman, Ahmad Al Baqir, Ahmad, Salmiah, Badron, Khairayu, Altalmas, Tareq M. K.

    Published 2023
    “…This study presents the algorithm design, technique, and simulation of a Speech Recognition-based method to detect the correct articulation point (Makhraj) of the throat letters in the Quranic word. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Terrain awareness mobility model to support outdoor mobility for people with vision impairment by Yousef, Malkawi Abeer Dirar

    Published 2023
    “…As well the provided measurement methods can assist stakeholders in teaching locomotion for PVI. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…The challenge to Steganography is the amount of information to be embedded in the host file without affecting the properties of that file and to avoid distortion of the image, the video, or the sound host file and as a result, to avoid detection of hidden information existence. The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Halal authentication of alcohol in food and beverages products: a review by Mohamad Ikhiwan, Nur Hanisah, Tukiran, Nur Azira

    Published 2024
    “…This paper aims to review alcohol and the amount of permissible usage in food and beverages as discussed by Muslim scholars and to ascertain and validate the presence of alcohol in food and beverage products, ensuring that it is appropriate for Muslim consumption. Various analytical methods have been developed to confront this issue, including using gas chromatography, mass spectrometry, electronic nose, and a combination of machine learning algorithms, biosensors, and specific gravimetry methods. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Halal authentication of alcohol in food and beverages products: a review / Nur Hanisah Mohamad Ikhiwan and Nur Azira Tukiran by Mohamad Ikhiwan, Nur Hanisah, Tukiran, Nur Azira

    Published 2024
    “…This paper aims to review alcohol and the amount of permissible usage in food and beverages as discussed by Muslim scholars and to ascertain and validate the presence of alcohol in food and beverage products, ensuring that it is appropriate for Muslim consumption. Various analytical methods have been developed to confront this issue, including using gas chromatography, mass spectrometry, electronic nose, and a combination of machine learning algorithms, biosensors, and specific gravimetry methods. …”
    Get full text
    Get full text
    Article
  19. 19

    Hand Gesture Recognition Using Artificial Neural Networks by Mustafa, Mohd Amrallah

    Published 2007
    “…The performance of recognition rate in this research is 95% which shows a major improvement in comparison to the available methods. …”
    Get full text
    Get full text
    Thesis
  20. 20