Search Results - (( model evaluation method algorithm ) OR ( pattern detection method algorithm ))

Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA by Bian, Hui

    Published 2025
    “…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Outbreak detection model based on danger theory by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2014
    “…Two outbreak diseases, dengue and SARS, are subjected to a danger theory algorithm; namely the dendritic cell algorithm.To evaluate the model, four measurement metrics are applied: detection rate, specificity, false alarm rate, and accuracy. …”
    Get full text
    Get full text
    Article
  6. 6

    Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7 by Rusdinaidi, Saffa Nasuha, Hashim, Khairil Afendy, Ahmad Dahlan, Zaki

    Published 2024
    “…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi by Rusdinadi, Saffa Nasuha

    Published 2024
    “…These images are then processed using yolov7, a state-of-the-art object detection algorithm, to accurately identify and classify surface cracks. the study involves the collection of a comprehensive dataset of concrete surfaces with varying crack patterns, pre-processed using Roboflow and Opencv tools to enhance crack features. the annotated dataset is utilized to train and validate the yolov7 model, ensuring high precision which is 96.8% and 90.1% recall in crack detection. the performance of the model is evaluated through metrics such as precision, recall, and f1-score, demonstrating its robustness and reliability in detecting both fine and prominent cracks. …”
    Get full text
    Get full text
    Student Project
  8. 8

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…On the other hand, artificial intelligence had been ways to enhances embedded system by enabling real-time, accurate detection and management of PCB defects through advanced pattern recognition and automated inspection methods. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…This performance is validated through rigorous comparative assessments against various classification algorithms and state-of-the-art methods, revealing notable advantages in terms of predictive precision, computational efficiency, and adaptability to real-world clinical scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Particle track finding using hough transform in a central drift chamber detector / Khasmidatul Akma Mohamed Kamal Azmi by Khasmidatul Akma , Mohamed Kamal Azmi

    Published 2022
    “…The assessment of charged particle track findings have improved significantly. The method of the Hough Transform became an iconic method to trace and identify the pattern of the charged track in the HEP based on the evaluation of the track finding in the cloud chamber experiment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Photogrammetric low-cost unmanned aerial vehicle for pothole detection mapping / Shahrul Nizan Abd Mukti by Abd Mukti, Shahrul Nizan

    Published 2022
    “…For volume estimation purpose, a Digital Elevation Models (DEM) were generated from photogrammetric method with flight parameters of three (3) different camera focal length and ten (10) UAV altitude. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive feature selection for denial of services (DoS) attack by Yusof, Ahmad Riza'ain, Udzir, Nur Izura, Selamat, Ali, Hamdan, Hazlina, Abdullah @ Selimun, Mohd Taufik

    Published 2017
    “…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor by Mohamad Nor, Ahmad Azhari

    Published 2024
    “…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki by Mahmoud, Khaki

    Published 2014
    “…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers