Search Results - (( using classification problem algorithm ) OR ( using detection method algorithm ))

Refine Results
  1. 1

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…In addition, the use of techniques such as watchdogs, routing and databases cannot solve problems which is detecting an important layer thoroughly, lack of parameters in the database and failure to detect some important jammers due to limited jammer detection methods. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  4. 4

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…The algorithm employs the First Lag Autocorrelation and the Modified Sample Entropy methods to detect and classify weak hand closing and opening muscle activities by using signal obtained from the Flexor Carpi Ulnaris forearm muscle. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…A well known task is classification that predicts the class of new instances using known features or attributes automatically. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Facial expression type recognition using K-Nearest Neighbor algorithm / Norhafizah Saffian by Saffian, Norhafizah

    Published 2017
    “…The k-Nearest Neighbor classifier is applied as the classification algorithm. The confusion matrix calculation is used to measure the accuracy of k-NN classifier. …”
    Get full text
    Get full text
    Thesis
  12. 12

    AUTOMATED VEHICLE COUNTING AND CLASSIFICATION SYSTEM FOR TRAFFIC CENSUS by MOHMOOD NOR, MOHD NAZIF HAWARI

    Published 2012
    “…Computer vision technology is used to achieve this objective. For the vehicle detection, background subtraction and approximate median algorithm are used. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…Several methods have been used to classify the ASD from non-ASD people. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Development of Real-Time Eye Tracking Algorithm by Anwar, S.N.S.S., Aziz, A.A., Adil, S.H.

    Published 2021
    “…This project develops a real-time eye tracking algorithm to improve the accuracy of iris detection and gaze classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Deep learning object detector using a combination of Convolutional Neural Network (CNN) architecture (MiniVGGNet) and classic object detection algorithm by Ismail, Asmida, Ahmad, Siti Anom, Che Soh, Azura, Hassan, Mohd Khair, Harith, Hazreen Haizi

    Published 2020
    “…The performance of this method can work in some specific use cases and effectively solving the problem of the inaccurate classification and detection of typical features.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
    Article