Search Results - (( using active method algorithm ) OR ( software classification using algorithm ))

Refine Results
  1. 1

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    BRAIN ACTIVITIES FOR MOTOR MOVEMENT by ., WAFAA ELSAYED ELBASTY

    Published 2012
    “…Feature vectors are used to differentiate the different brain activity signals associated with the user’s attention, Linear Discriminate Linear (LDA) method is used in feature classification step to achieve these goals. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…However, this has exposed to the malicious activities and online threat to the users which will disrupt the method of every system and performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A new ant based rule extraction algorithm for web classification by Ku-Mahamud, Ku Ruhana, Saian, Rizauddin

    Published 2011
    “…Methods to reduce the number of attributes and discretization are two important data pre-processing steps before the data can be used for classification activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7

    Analysis Of Personal Protective Equipment Classification Method Using Deep Learning by Siti Zahrah Nur Ain, Silopung

    Published 2022
    “…This classification is performed using Anaconda and Jupyter Notebok Software that use Python as the programming language. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…This system has many usages in security system and also can be used for authentication, person verification, video surveillance, preventing crime, and security activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Input significance analysis: Feature selection through synaptic weights manipulation for EFuNNs classifier by Hassan, Raini, Taha Alshaikhli, Imad Fakhri, Ahmad, Salmiah

    Published 2017
    “…The data stored or collected from these digital activities can be so large or complex, and caused the traditional data processing algorithms or software to be inadequate when used to process them. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Radiomics analysis and supervised machine learning model for classification of cervical cancer images using diffusion weighted imaging-MRI by Ramli, Zarina

    Published 2024
    “…This study investigates the efficacy of staging classification using diffusion-weighted imaging magnetic resonance imaging (DWIMRI) through radiomic analysis and machine learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Visual codebook analysis in image understanding / Hoo Wai Lam by Hoo, Wai Lam

    Published 2015
    “…However, attributes need extensive human annotation to perform. The proposed method performs zero-shot learning using a newly defined Coarse Class and Fine Class, so that both seen classes and unseen classes can be related. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Early detection of high water saturation spots for landslide prediction using thermal image analysis by Aufa Huda, Muhammad Zin

    Published 2018
    “…There are three segmentation algorithm used in this study which are HSV, K-Means and Feature Matching. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…Therefore, by the aim of this project is to facilitate and solve the problem by developed FitwithTrainer android application with auto-formation group chat for clients and trainers along with rule-based expert system for classification of trainer in term of trainer’s levels and specialties in website system. Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
    Get full text
    Get full text
    Student Project