Search Results - (( java implication tree algorithm ) OR ( data detection through algorithm ))

Refine Results
  1. 1

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…The optimized DBN algorithm, known as the HW-DBN algorithm, integrated through feature learning based on a Gaussian–Bernoulli Restricted Boltzmann Machine as well as classification task through a weight neuron network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Early detection of anxiety in social media using Convolution neural network / Mohd Tharwan Hadi Ruslan by Ruslan, Mohd Tharwan Hadi

    Published 2021
    “…So this project aim to detect anxiety early through social media Twitter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The rapid growth of technologies might endanger them to various network attacks due to the nature of data which are frequently exchange their data through Internet and large-scale data that need to be handle. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…This approach that is according to the DNN model reduces irrelevant features in the intrusion detection data sets of CICIDS2017 to improve the accuracy and cluster high-scale data sets. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…The hybrid algorithm was implemented to minimise the length of time needed to address the massive scale of the detected parallel power load abnormalities. …”
    Article
  9. 9

    An estimation algorithm for improved maritime obstacle detection by Amir Alaqeb, Abdelrhman Mohamed, Rashid, Muhammad Mahbubur, Mohd Zaki, Hasan Firdaus, Embong, Abd Halim

    Published 2024
    “…A specialized ROS node facilitates data fusion by prioritizing ZED2I camera data, enhancing detection accuracy through comparisons with LiDAR data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Automatic filtering of far outliers in multibeam echo sounding dataset using robust detection algorithms by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2005
    “…The entire data have to go through a series of far outliers screening. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…This paper represents a model that accounts for the detection of botnets through the use of machine learning algorithms. …”
    Get full text
    Get full text
    Article
  12. 12

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…This enhanced image data numbers then went through Logistic Regression as a classifier. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif by Abdalla Osama , Hamdan Abdellatif

    Published 2024
    “…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    DRIVER FATIGUE ACCIDENT PREVENTION USING EYE BLINK SENSOR by AZIZAN, SITI ROSMA

    Published 2013
    “…This paper proposes a way to detect the level of fatigue among drivers through detection of eye blinks. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column by Othman, M. R., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis