Search Results - (( using vector method algorithm ) OR ( using detection method algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  4. 4

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…The proposed method is found to be useful to tackle the limitations of the existing methods and serve TVS process efficiently.…”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…In this dissertation, a new vegetation encroachment detection method was proposed by studying the feasibility of using the visible-light band of highresolution satellite images using the RetinaNet deep learning model and Support Vector Machine algorithm (SVM). …”
    text::Thesis
  8. 8

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Vader lexicon and support vector machine algorithm to detect customer sentiment orientation by Vivine Nurcahyawati, ., Zuriani, Mustaffa

    Published 2023
    “…To accomplish this, a dataset from the Amazon website will be analyzed and classified using the Support Vector Machine algorithm. The objective of this method is to determine the level of customer orientation present within the dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  13. 13

    Micro-Crack Detection Of Solar Cells Featuring Adaptive Anisotropic Diffusion Filter And Semi-Supervised Support Vector Learning by Majid, Said Amirul Anwar B Ab Hamid @ Ab

    Published 2014
    “…These properties together with the shape feature of the micro-crack are used in developing the detection algorithm. In this work, an image processing algorithm featuring an adaptive anisotropic diffusion filter and a segmentation technique based on twostage thresholding is proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals by Ahmed, Ahmed Elsayed Elmahdy

    Published 2014
    “…In this algorithm a sliding window of one second is utilized to check for epileptic seizure at each second and the classification method used is support vector machine (SVM). …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif by Abdalla Osama , Hamdan Abdellatif

    Published 2024
    “…This thesis presents two innovative methods that holistically address these challenges at algorithmic and data levels to enhance heart disease detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article