Search Results - (( using evaluation method algorithm ) OR ( risk detection method algorithm ))

Refine Results
  1. 1

    Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System by Al-Hameli, Bassam Abdo, Alsewari, Abdulrahman A., Alraddadi, Abdulaziz Saleh, Aldhaqm, Arafat

    Published 2021
    “…Sensitivity, specificity, and accuracy have been measured to evaluate the results. The results achieved indicate that the proposed method with an accuracy of 91.65% outperformed the results of the earlier methods examined in this article.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…We evaluated the proposed method using the monthly data on measles cases in Khyber-Pakhtunkhwa, Pakistan (Jan 2016- Dec 2016), and the efficiency was compared with the state-of-the-art methods: EigenSpot and Space-time scan statistic (SaTScan). …”
    Get full text
    Get full text
    Article
  3. 3

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…We evaluated the proposed method using the monthly data on measles cases in Khyber-Pakhtunkhwa, Pakistan (Jan 2016- Dec 2016), and the efficiency was compared with the state-of-the-art methods: EigenSpot and Space-time scan statistic (SaTScan). …”
    Get full text
    Get full text
    Article
  4. 4

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…In summary, this study advances the field by delivering an effective, optimized predictive algorithm for early heart disease detection, thereby offering valuable insights that could enhance healthcare outcomes, support proactive cardiovascular risk management, and pave the way for future innovations in personalized medicine…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Evaluation of intracerebral haemorrhages surface area using artificial intelligence in computed tomography by Huddin, Azzam Basseri, Huddin, Aqilah Baseri, Tharek, Anas, Wan Zaki, Wan Mimi Diyana, Muda, Ahmad Sobri

    Published 2022
    “…This study aims to develop an automated detection algorithm with higher sensitivity in ICH evaluation in comparison to the conventional method. …”
    Get full text
    Get full text
    Article
  10. 10

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…There are hundreds of published works related to spam message and spam account detection that aim to identify effective detection methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun by Goh, Wei Sheng, Wan Din, Wan Isni Sofiah, Waseem, Quadri, Zabidi, A.

    Published 2023
    “…The purpose of this research project is to evaluate currently available crack detection systems and to develop an automated crack detection system using Aggregate Channel Features (ACF) that can be used with unmanned aerial vehicles (UAV). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Mental stress classification based on selected EEG channels using Correlation Coefficient of Hjorth Parameters by Hag, Ala, Fares, Al-Shargie, Handayani, Dini Oktarina Dwi, Houshyar, Asadi

    Published 2023
    “…Furthermore, CCHP outperformed existing channel selection methods by an impressive 8%. These findings strongly indicate that the CCHP algorithm shows great promise in the design of a wearable application for mental stress detection, utilizing a minimal number of EEG channels.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20