Search Results - (( using detection method algorithm ) OR ( using solution learning algorithm ))
Search alternatives:
- learning algorithm »
- solution learning »
- method algorithm »
- using detection »
- using solution »
-
1
Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi
Published 2024“…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. …”
Get full text
Get full text
Student Project -
2
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…This approach integrates a conditional variational autoencoder (CVAE) to effectively balance the dataset and a stack predictor (SPFHD) that utilizes tree-based ensemble learning algorithms. The base models' predictions are integrated using a support vector machine, significantly enhancing detection accuracy. …”
Get full text
Get full text
Get full text
Thesis -
3
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…These images are then processed using Yolov7, a state-of-the-art object detection algorithm, to accurately identify and classify surface cracks. …”
Get full text
Get full text
Conference or Workshop Item -
4
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
6
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
7
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
Conference Paper -
8
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…In recent studies, we seen developers and researchers proposing solutions on deep learning algorithms like YOLO, EfficientNet, CNN, MobileNet etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Pothole detection using UAV with deep learning algorithm for road inspection
Published 2024Get full text
Get full text
Conference or Workshop Item -
10
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
text::Thesis -
11
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Phishing detection method of machine learning has been used to classify tweets on Twitter but the number of classification features used and the one achieving the highest phishing tweet detection accuracy of 94.56% (Random Forest) is still considered high. …”
Get full text
Get full text
Thesis -
12
-
13
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
14
Fatigue State Detection Through Multiple Machine Learning Classifiers Using EEG Signal
Published 2023“…A preprocessing stage extracts relevant information before applying machine learning algorithms to the signal. Three analytical methods were employed in this study, specifically the Decision Tree, the K-Nearest Neighbors and the Random Forest. …”
Get full text
Get full text
Get full text
Article -
15
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…Phishing detection is considered a critical problem in cybersecurity, and utilising machine learning with an efficient feature selection method for precisely identifying malicious websites is deemed the most critical challenge. …”
Get full text
Get full text
Get full text
Article -
16
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
text::Thesis -
19
A new intelligent multilayer framework for insider threat detection
Published 2021“…Subsequently, using the K-Nearest Neighbors algorithm, an anomaly insider threat detection algorithm has been developed. …”
Get full text
Get full text
Get full text
Article -
20
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article
