Search Results - (( using detection method algorithm ) OR ( basic generation using algorithm ))

Refine Results
  1. 1

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The method used for detecting face is a combination of color based technique and template matching. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Numerical Analysis of structural batteries response with the presence of uncertainty by Syahiir Kamil, Ahmad Kamal Ariffin, Abdul Hadi Azman, Mohamad Syazwan Zafwan Mohamad Suffian

    Published 2023
    “…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Improvement of Cepstrum Analysis for the Purpose to Detect Leak, Feature and Its Location in Water Distribution System based on Pressure Transient Analysis / Hanafi.M.Yusop ...[et... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2019
    “…To extract this signal, many signal analysis methods were implemented by researchers such as cross-correlation, genetic algorithm, and wavelets transform. …”
    Get full text
    Get full text
    Article
  7. 7

    Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty by Syahiir, Kamil, Mohamad Syazwan Zafwan, Mohamad Suffian, Ahmad Kamal Ariffin, Mohd Ihsan, Abdul Hadi, Azman

    Published 2023
    “…To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Pumped-storage scheduling using particle swarm optimization / Amirul Asraf Razali by Razali, Amirul Asraf

    Published 2012
    “…The basic PSO algorithms_is been used to determine the economic dispatch of the hydrothermal generation with pumped-storage unit. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…The algorithm employs the First Lag Autocorrelation and the Modified Sample Entropy methods to detect and classify weak hand closing and opening muscle activities by using signal obtained from the Flexor Carpi Ulnaris forearm muscle. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Obfuscated Malware Detection: Impacts on Detection Methods by Gorment N.Z., Selamat A., Krejcar O.

    Published 2024
    “…This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. …”
    Conference Paper
  18. 18

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images by Elaraby, Ahmed, Al-Ameen, Zohair

    Published 2022
    “…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
    Get full text
    Get full text
    Article
  20. 20

    Fast clock tree generation using exact zero skew clock routing algorithm by Reaz, Mamun Ibn, Ibrahimy, Muhammad Ibn, Amin, Nowshad

    Published 2009
    “…The routing algorithm used in this tool is based on the Exact Zero Skew Routing Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article