Search Results - (( using factorization learning algorithm ) OR ( using detection method algorithm ))

Refine Results
  1. 1

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan by Adenan, Muhammad Nasrul Hakim

    Published 2013
    “…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…Phishing detection method of machine learning has been used to classify tweets on Twitter but the number of classification features used and the one achieving the highest phishing tweet detection accuracy of 94.56% (Random Forest) is still considered high. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Embedded Machine Learning-Based Spoiled Leftover Food Detection Device for Multiclass Classification by Wan Azman,, Wan Nur Fadhlina Syamimi, Ku Azir, Ku Nurul Fazira, Mohd Khairuddin, Adam

    Published 2024
    “…After five days of storage, the freshness of cooked leftovers was evaluated using an electronic nose combined with machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Automated traffic counting data collection and analysis by Low, Anand Hong Ren

    Published 2021
    “…This project proposed an automated traffic counting data collection and analysis algorithm that is able to use computer vision to count and measure the speed of vehicles, while also able to classify vehicles into different categories using the power of deep learning and AI. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Lung Nodules Classification Using Convolutional Neural Network with Transfer Learning by Abdulrazak Yahya, Saleh, Ros Ameera, Rosdi

    Published 2023
    “…The objectives of this study are to pre-process lung nodules data, develop a CNN with transfer learning algorithm, and analyse the effectiveness of CNN with transfer learning compared to standard of other methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding
  15. 15

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
    Get full text
    Get full text
    Article
  16. 16

    Review of Wheat Disease Classification and Severity Detection Models by Hongyan, Zang, Annie, Joseph, Shourong, Zhang, Rong, Liu, Wanzhen, Wang

    Published 2023
    “…To combat these diseases, researchers have been studying the use of advanced techniques such as deep plant disease learning and image processing methods for identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Investigating optimal smartphone placement for identifying stairs movement using machine learning by Muhammad Ruhul Amin, Shourov, Husman, Muhammad Afif, Toha, Siti Fauziah, Jasni, Farahiyah

    Published 2023
    “…The goal of this study is to investigate and develop a reliable and accurate method for detecting gait activities on an inclined surface such as stairs using smartphones as the sensing device. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Machine Learning Approaches to Advanced Outlier Detection in Psychological Datasets by Abri K.Al., Sidhu M.S.

    Published 2025
    “…In conclusion, while individual algorithms provide distinct perspectives, ensemble techniques enhance the accuracy and consistency of outlier detection. …”
    Article
  20. 20

    Fast shot boundary detection based on separable moments and support vector machine by Idan, Zinah N., Abdulhussain, Sadiq H., Mahmmod, Basheera M., Al-Utaibi, Khaled A., Syed Abdul Rahman Al-, Syed Abdul Rahman Al-Hadad, Sait, Sadiq M.

    Published 2021
    “…This leads to a reduction in the computational cost and disturbance factors. Second, for each active area, the moments are computed using orthogonal polynomials. …”
    Get full text
    Get full text
    Get full text
    Article