Search Results - (( user detection method algorithm ) OR ( data visualization using algorithm ))
Search alternatives:
- data visualization »
- method algorithm »
- using algorithm »
- user detection »
-
1
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…By harnessing natural language processing techniques and data visualization tools, the project seeks to provide user-friendly solution for early detection and prevention of suicidal intentions expressed on social media. …”
Get full text
Get full text
Thesis -
2
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
3
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Development of Iterative Minimum-Maximum Filter for Reducing Impulse Noise from Highly Corrupted Images
Published 2006“…In an environment of fierce noise contamination, infected pixels tend to connect into noise blotches that could give the filtering algorithm an illusion of being part of the original image data. …”
Get full text
Get full text
Thesis -
5
Feature extraction and localisation using scale-invariant feature transform on 2.5D image
Published 2015“…In this paper, we present and discuss our new automatic landmarking method on face data using 2.5-dimensional (2.5D) range images. …”
Get full text
Get full text
Get full text
Article -
6
Processing and classification of landsat and sentinel images for oil palm plantation detection
Published 2022“…It first focuses on the correction algorithm needed to estimate the true surface reflectance value of the satellite image data before the image is filtered to reduce any noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
9
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
10
Wifi-based location-independent human activity recognition and localization using deep learning
Published 2024“…Second, Multi-head Attention Mechanism Networks capture intricate patterns in Channel State Information (CSI) data, enhancing recognition accuracy for human activities detected through WiFi signals. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…The method used to detect fake e-mail is by tracing back the email header. …”
Get full text
Get full text
Research Reports -
12
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Algorithms are a captivating use case for visualization. …”
Get full text
Get full text
Get full text
Article -
14
Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques
Published 2022“…The findings demonstrated that these methods are handcrafted and the algorithms need to be changed when applying to different images, which is not practical to be used during flood disasters. …”
Get full text
Get full text
Thesis -
15
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The User Profile Filter (UPF) was proposed to aid the SVM algorithm to classify the captured traffics into normal and abnormal behavior. …”
Get full text
Get full text
Get full text
Thesis -
16
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
17
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
Get full text
Get full text
Thesis -
18
Summary of best efficient algorithms on cognitive radio cooperative spectrum sensing to improve QoS
Published 2014“…Cooperative spectrum sensing (CSS) in cognitive radio (CR) has been widely investigated to be considered as a spectrum scanning mechanism that allows secondary users or cognitive radio users (SUs) to use detected spectrum holes caused by primary users (PUs) absence. …”
Get full text
Get full text
Conference or Workshop Item -
19
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
20
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. The approach aims to offer a solution to protect users from potential threats such as Banking Trojan malware. …”
Get full text
Get full text
Thesis
