Search Results - (( using detection method algorithm ) OR ( software classifications using algorithm ))

Refine Results
  1. 1
  2. 2

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…Automatic diagnostic methods were frequently used to conduct breast cancer diagnoses in order to increase the accuracy and speed of detection. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The more the algorithm use in a project the better performance will be in result.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…Recently, deep learning methods have significantly sharpened the cutting edge of learning algorithms in a wide range of artificial intelligence tasks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of Real-Time Eye Tracking Algorithm by Anwar, S.N.S.S., Aziz, A.A., Adil, S.H.

    Published 2021
    “…The eye tracking algorithm is implemented in OpenCV using Python Software for ease of portability. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Alternate methods for anomaly detection in high-energy physics via semi-supervised learning by Md. Ali, Mohd. Adli, Badrud’din, Nu’man, Abdullah, Hafidzul, Kemi, Faiz

    Published 2020
    “…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Lung cancer medical images classification using hybrid CNN-SVM by Abdulrazak Yahya, Saleh, Chee, Ka Chin, Vanessa, Penshie, Hamada Rasheed Hassan, Al-Absi

    Published 2021
    “…Computer-Aided Detection (CAD) has been used to process CT images of the lung to determine whether an image has traces of cancer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Book Chapter
  17. 17
  18. 18

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Deep learning methods for facial expression recognition by Mohammad Masum Refat, Chowdhury, Zainul Azlan, Norsinnira

    Published 2019
    “…In our study, we have tested the algorithm using Japanese Female facial expressions database (JAFFE) datasets by anaconda software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper