Search Results - (( using active method algorithm ) OR ( software classification methods algorithm ))

Refine Results
  1. 1

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    BRAIN ACTIVITIES FOR MOTOR MOVEMENT by ., WAFAA ELSAYED ELBASTY

    Published 2012
    “…Feature vectors are used to differentiate the different brain activity signals associated with the user’s attention, Linear Discriminate Linear (LDA) method is used in feature classification step to achieve these goals. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…However, this has exposed to the malicious activities and online threat to the users which will disrupt the method of every system and performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…This system has many usages in security system and also can be used for authentication, person verification, video surveillance, preventing crime, and security activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier by Hassan, Raini, Taha Alshaikhli, Imad Fakhri, Ahmad, Salmiah

    Published 2017
    “…The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI by Ramli, Zarina

    Published 2024
    “…The semi-automated active contour model (ACM) algorithm (average ICC = 0.952 ± 0.009, p > 0.05) was found to be more robust and reproducible than fully manual segmentation (average ICC = 0.897 ± 0.011, p > 0.05). …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Visual codebook analysis in image understanding / Hoo Wai Lam by Hoo, Wai Lam

    Published 2015
    “…However, attributes need extensive human annotation to perform. The proposed method performs zero-shot learning using a newly defined Coarse Class and Fine Class, so that both seen classes and unseen classes can be related. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Early detection of high water saturation spots for landslide prediction using thermal image analysis by Aufa Huda, Muhammad Zin

    Published 2018
    “…There are three segmentation algorithm used in this study which are HSV, K-Means and Feature Matching. …”
    Get full text
    Get full text
    Thesis
  20. 20