Search Results - (( user detection method algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…By harnessing natural language processing techniques and data visualization tools, the project seeks to provide user-friendly solution for early detection and prevention of suicidal intentions expressed on social media. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Development of Iterative Minimum-Maximum Filter for Reducing Impulse Noise from Highly Corrupted Images by Jabir, Amjad Najim

    Published 2006
    “…In an environment of fierce noise contamination, infected pixels tend to connect into noise blotches that could give the filtering algorithm an illusion of being part of the original image data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Feature extraction and localisation using scale-invariant feature transform on 2.5D image by Suk, Ting Pui, Jacey-Lynn, Minoi, Terrin, Lim, Fradinho Oliveira, João, Fyfe Gillies, Duncan

    Published 2015
    “…In this paper, we present and discuss our new automatic landmarking method on face data using 2.5-dimensional (2.5D) range images. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Processing and classification of landsat and sentinel images for oil palm plantation detection by Mohd Ibrahim, Azhar, Asming, Muhammad Anwar Azizan, Abir, Intiaz Mohammad

    Published 2022
    “…It first focuses on the correction algorithm needed to estimate the true surface reflectance value of the satellite image data before the image is filtered to reduce any noise. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Monograph
  10. 10

    Wifi-based location-independent human activity recognition and localization using deep learning by Abuhoureyah, Fahd Saad Amed

    Published 2024
    “…Second, Multi-head Attention Mechanism Networks capture intricate patterns in Channel State Information (CSI) data, enhancing recognition accuracy for human activities detected through WiFi signals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques by Muhadi, Nur 'Atirah

    Published 2022
    “…The findings demonstrated that these methods are handcrafted and the algorithms need to be changed when applying to different images, which is not practical to be used during flood disasters. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The User Profile Filter (UPF) was proposed to aid the SVM algorithm to classify the captured traffics into normal and abnormal behavior. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems by Alansi, M., Elshafiey, I., Al-Sanie, A., Mabrouk, A.

    Published 2016
    “…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
    Get full text
    Get full text
    Article
  17. 17

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS by Akbari, M., Reza, A.W., Noordin, K.A., Manesh, M.R., Hindia, M.N.

    Published 2014
    “…Cooperative spectrum sensing (CSS) in cognitive radio (CR) has been widely investigated to be considered as a spectrum scanning mechanism that allows secondary users or cognitive radio users (SUs) to use detected spectrum holes caused by primary users (PUs) absence. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. The approach aims to offer a solution to protect users from potential threats such as Banking Trojan malware. …”
    Get full text
    Get full text
    Thesis