Search Results - (( using selection method algorithm ) OR ( basic detection method algorithm ))

Refine Results
  1. 1

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Based on previous researches, most existing segmentation methods focused on a specific environment. Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…The algorithm created is used to detect the ball in the images. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…This thesis proposes methods that can overcome the problems of good behaviour selection and good behaviour deletion. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee by Wong , Wen Yee

    Published 2023
    “…The proposed deep learning model renders faster without the use of SMOTE. Any resampling algorithm is not a necessity in the case of this proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Early detection of high water saturation spots for landslide prediction using thermal image analysis by Aufa Huda, Muhammad Zin

    Published 2018
    “…There are three segmentation algorithm used in this study which are HSV, K-Means and Feature Matching. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…These three nodes, in turn, participate in locating the entire network using tri-lateration method with some appropriate vision characteristics. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…The clustering results have been validated using the F-measure, Entropy and Purity methods of measurement and compared with two common methods, which are information extraction and textual document clustering, for example, K-means, Frequent Item-Set, Hierarchical Clustering Algorithms and Oracle Text. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…The results of the tests indicated increased performance in terms of fewer false positives, less CPU utilisation, less control channel bandwidth used, higher packet delivery ratio, and fewer flow requests made to the controller with 99.56% detection accuracy as compared to selected benchmarks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20