Search Results - (( knowledge detection machine algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- knowledge detection »
- machine algorithm »
- java application »
-
1
An algorithm for Elliott Waves pattern detection
Published 2018“…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. …”
Get full text
Get full text
Article -
2
An algorithm for Elliott Waves pattern detection
Published 2018“…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. …”
Get full text
Get full text
Article -
3
Early detection of dengue disease using extreme learning machine
Published 2018Get full text
Get full text
Article -
4
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Evaluation of fall detection classification approaches
Published 2012“…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
Get full text
Get full text
Conference or Workshop Item -
6
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Currently, most of the telecommunication providers monitor the network performance degradation hence troubleshoot the present of the fault by using commercial test gear on-site, which may be resolved using data analytics and machine learning algorithm. This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
Get full text
Get full text
Get full text
Article -
7
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…This study uses machine learning method to detect anomalies in system log files. …”
Get full text
Get full text
Get full text
Thesis -
8
Fuzzy support vector machine based fall detection method for traumatic brain injuries: A new systematic approach of combining fuzzy logic with support vector machine to achieve hig...
Published 2022“…One of the most commonly used algorithms is Support Vector Machine (SVM). However, classical SVM can neither use prior knowledge to process accurate classifications nor solve problems characterized by ambiguity. …”
Get full text
Get full text
Get full text
Article -
9
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Results of studying color segmentation using machine-learning algorithm and color space analysis is presented in this thesis. …”
Get full text
Get full text
Thesis -
10
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The challenging differences between the phishing attacks on email and Twitter are that Twitter disseminates vast information and is difficult to be detected unlike email. Many phishing detection methods, ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing attacks for spam emails, machine learning approaches achieve the best phishing email detection results. …”
Get full text
Get full text
Thesis -
11
Induction machine diagnostic using adaptive neuro fuzzy inferencing system
Published 2004Get full text
Get full text
Get full text
Book Section -
12
On equivalence of FIS and ELM for interpretable rule-based knowledge representation
Published 2023“…Classification (of information); Computer aided diagnosis; Fault detection; Fuzzy systems; Knowledge acquisition; Knowledge representation; Learning systems; Matrix algebra; Membership functions; Pattern recognition; Extreme learning machine; Fault detection and diagnosis; Fuzzy if-then rules; Fuzzy inference systems; Fuzzy membership function; Initialization technique; Interpretable rules; Rule based; Fuzzy inference; algorithm; artificial intelligence; artificial neural network; benchmarking; classification; electric power plant; factual database; feedback system; fuzzy logic; machine learning; nerve cell; reproducibility; statistical model; Algorithms; Artificial Intelligence; Benchmarking; Classification; Databases, Factual; Feedback; Fuzzy Logic; Machine Learning; Models, Statistical; Neural Networks (Computer); Neurons; Power Plants; Reproducibility of Results…”
Article -
13
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
14
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. …”
Get full text
Get full text
Get full text
Article -
15
Brain stroke detection using medical images
Published 2025“…In order to enable automated brain clot detection and adapt to various image variations, machine learning algorithms are integrated for classification. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network
Published 2009“…Therefore, several real life machining scenarios with some expert knowledge input and machine technology features were incorporated. …”
Get full text
Get full text
Article -
17
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
18
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
19
-
20
