Search Results - (( using factorization learning algorithm ) OR ( using detection method algorithm ))
Search alternatives:
- using factorization »
- learning algorithm »
- method algorithm »
- using detection »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
A Systematic Review Of Machine Learning Algorithms For Mental Health Detection Using Social Media Data
Published 2026journal::journal article -
3
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
4
Pothole detection using UAV with deep learning algorithm for road inspection
Published 2024Get full text
Get full text
Conference or Workshop Item -
5
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
6
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
7
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Phishing detection method of machine learning has been used to classify tweets on Twitter but the number of classification features used and the one achieving the highest phishing tweet detection accuracy of 94.56% (Random Forest) is still considered high. …”
Get full text
Get full text
Thesis -
8
An Embedded Machine Learning-Based Spoiled Leftover Food Detection Device for Multiclass Classification
Published 2024“…After five days of storage, the freshness of cooked leftovers was evaluated using an electronic nose combined with machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
Get full text
Get full text
Thesis -
10
-
11
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
12
Hybrid sampling and random forest machine learning approach for software detect prediction
Published 2019“…Cross validation is used to remove overriding problem. Scikit-learn library is used for machine learning algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Automated traffic counting data collection and analysis
Published 2021“…This project proposed an automated traffic counting data collection and analysis algorithm that is able to use computer vision to count and measure the speed of vehicles, while also able to classify vehicles into different categories using the power of deep learning and AI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Lung Nodules Classification Using Convolutional Neural Network with Transfer Learning
Published 2023“…The objectives of this study are to pre-process lung nodules data, develop a CNN with transfer learning algorithm, and analyse the effectiveness of CNN with transfer learning compared to standard of other methods. …”
Get full text
Get full text
Get full text
Get full text
Proceeding -
15
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
Get full text
Get full text
Article -
16
Review of Wheat Disease Classification and Severity Detection Models
Published 2023“…To combat these diseases, researchers have been studying the use of advanced techniques such as deep plant disease learning and image processing methods for identification. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…The goal of this study is to investigate and develop a reliable and accurate method for detecting gait activities on an inclined surface such as stairs using smartphones as the sensing device. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Machine Learning Approaches to Advanced Outlier Detection in Psychological Datasets
Published 2025“…In conclusion, while individual algorithms provide distinct perspectives, ensemble techniques enhance the accuracy and consistency of outlier detection. …”
Article -
20
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…This leads to a reduction in the computational cost and disturbance factors. Second, for each active area, the moments are computed using orthogonal polynomials. …”
Get full text
Get full text
Get full text
Article
