Search Results - (( java implication tree algorithm ) OR ( site detection method algorithm ))
Search alternatives:
- java implication »
- implication tree »
- method algorithm »
- tree algorithm »
- site detection »
-
1
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
2
Web application vulnerabilities detection model
Published 2016“…The evaluation of the proposed method is via detection accuracy of each web vulnerability.…”
Get full text
Get full text
Research Reports -
3
Wind direction and speed estimation for quadrotor based gas tracking robot
Published 2017“…In gas extraction sites, the incidents of gas leaking poses a damage to workers on site. …”
Get full text
Book Section -
4
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
Get full text
Get full text
Get full text
Thesis -
5
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
Get full text
Get full text
Thesis -
6
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
Published 2024“…Artificial Neural Network (ANN) is one popular method for website phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics connected to phishing websites through a network training phase. …”
Get full text
Get full text
Get full text
Article -
7
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
8
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
9
Real-Time Detection of Personal Protective Equipment for Site Safety Using Deep Learning Techniques
Published 2022Get full text
Get full text
Undergraduates Project Papers -
10
Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism
Published 2024“…To improve the speed of video detection, a student's abnormal-behavior detection method was proposed based on improved YOLOv8 and attention mechanism to achieve real-time detection of cheating actions in an exam room on a regular performance computer. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery
Published 2021“…Feature extraction and segmentation images to extract stumps from a UAV scene of a forested area in Ulu Jelai, Pahang provides a quick, automated method for identifying stumps. This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
Get full text
Get full text
Get full text
Article -
12
A buffer-based online clustering for evolving data stream
Published 2019“…The proposed BOCEDS can be available in https://sites.google.com/view/md-manjur-ahmed and https://sites.google.com/view/kamrul-just.…”
Get full text
Get full text
Get full text
Article -
13
Tracking Pointer At Endoscopic Images For Telepointer Remote Guided
Published 2022“…Both methods have 100% accuracy in detecting and tracking the cursor. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Automatic detection of oil palm tree from UAV images based on the deep learning method
Published 2021“…The overall accuracy of oil palm tree detection was measured from three different sites with 97.06%, 96.58%, and 97.79% correct oil palm detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Distribution network fault section estimation using analytical database approach
Published 2004“…The fault needs to he detected, located and cleared as soon as possible. …”
Get full text
Get full text
Get full text
Thesis -
16
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…The use of social media, as well as computational tools and machine learning algorithm, contributes to current public health efforts to detect any indicators of depression from sources close to patients. � 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.…”
Conference Paper -
17
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…Previous studies have approached spam detection as a classification problem, high dimension, time-consuming problem, which requires new methods to address the problems. …”
Get full text
Get full text
Get full text
Article -
18
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
Get full text
Get full text
Get full text
Article -
19
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…The results showed that the proposed method was efficient and valid in detecting phishing websites’ URLs.…”
Get full text
Get full text
Get full text
Get full text
Article -
20
Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors
Published 2020“…The Amplitude Pace Switching (APS) detection algorithm is introduced to detect the amplitude of the user’s body movement for pace switching. …”
Get full text
Get full text
Thesis
