Search Results - site ((selection algorithm) OR (detection algorithm))

Search alternatives:

Refine Results
  1. 1

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…(SESB) to reduce their distribution loss, estimated around 15% at present in Sabah State, Malaysia. The hybrid algorithm is able to preselect customers to be inspected on-site for abnormalities or potential fraud according to their consumption patterns. …”
    Conference Paper
  4. 4

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…Transferability of each of the models was verified by testing in another site for consistency. The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Road condition assessment by OBIA and feature selection techniques using very high-resolution WorldView-2 imagery by Shahi, Kaveh, Mohd Shafri, Helmi Zulhaidi, Hamedianfar, Alireza

    Published 2016
    “…The chi-square algorithm outperformed SVM and RF techniques. The classification result based on CHI algorithm achieved an overall accuracy of 83.19% for the training image (first site). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The feature selection is introduced to select the most important from the extracted high-dimensional best features and feed the selected features into the minimum Redundancy and Maximal Relevance algorithm and apply random forest for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Covid-19 Fake News Detection Model On Social Media Data Using Machine Learning Techniques by Liew, Kelvin Kai Xuan

    Published 2023
    “…Then, to eliminate the computational burden of analysing all of the features in the dataset, feature selection is done. Finally, to categorise the covid -19 related dataset, multiple cutting-edge machine learning algorithms were trained. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    An object-based approach to detect tree stumps in a selective logging area using Unmanned Aerial Vehicle imagery by Aisyah Marliza Muhmad Kamarulzaman, Wan Shafrina Wan Mohd Jaafar, Siti Nor Maizah Saad, Hamdan Omar, Mohd. Rizaludin Mahmud

    Published 2021
    “…This research implemented a technique for detecting, segmenting, classifying, and measuring tree stumps by using the Multiresolution Segmentation Algorithm method. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    COVID-19 fake news detection model on social media data using machine learning techniques by Kai Xuan, Kelvin Liew, Bhuiyan, Mohaiminul Islam, Nur Shazwani, Kamarudin, Ahmad Fakhri, Ab Nasir, Muhammad Zulfahmi, Toh Abdullah@ Toh Chin Lai

    Published 2023
    “…Then, to eliminate the computational burden of analyzing all of the features in the dataset, feature selection is done. Finally, to categorize the COVID -19 related dataset, multiple cutting-edge machine-learning algorithms were trained. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Real-time personal protective equipment compliance detection using you only look once by Nurhanisah, Aminuddin, Nor Azuana, Ramli, Pratondo, Agus

    Published 2024
    “…The proposed research work employs the system of object detection from CCTV videos around the working sites of company XYZ through a framework that includes image acquisition, data collection, and video data pre-processing, with the implementation of various deep learning algorithms using state-of-the-art models such as You Only Look Once (YOLO) including YOLOv5, YOLOv7, and YOLOv8. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image by Samsudin, Sarah Hanim

    Published 2016
    “…Three feature selection algorithms of Genetic Algorithm (GA), Support Vector Machine (SVM) and Random Forest (RF) were used to select the most significant wavelengths since the algorithms works well with large size of data and widely applied for feature selection of hyperspectral remote sensing data. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing by Hamedianfar, Alireza

    Published 2015
    “…In the first case, the rule sets were manually developed from the first study site and then transferred to the second study site, which had a wider coverage. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cheating Detection in Examinations Using Improved YOLOv8 with Attention Mechanism by Yan, Zuo, Chai, Soo See, Goh, Kok Luong

    Published 2024
    “…To improve the efficiency of video reviews during invigilation, save labor costs, and strengthen invigilation efforts, this study proposes the use of target detection algorithms to achieve automatic detection of cheating actions in the exam room. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  20. 20