Search Results - (( _ detection method algorithm ) OR ( based education a algorithm ))

Refine Results
  1. 1

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    The application of suitable sports games for junior high school students based on deep learning and artificial intelligence by Ji, Xueyan, Samsudin, Shamsulariffin, Hassan, Muhammad Zarif, Farizan, Noor Hamzani, Yuan, Yubin, Chen, Wang

    Published 2025
    “…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    N/A and signature analysis for malwares detection and removal by Jawad, Ahmad Ridha, Sharif, Khaironi Yatim, Abdulsada, Ammar Khalel

    Published 2019
    “…Therefore, this study suggested N/A detection technique as the dynamic method (behaviour-based detection method) that depends on the Windows Registry (system database). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Application of target detection method based on convolutional neural network in sustainable outdoor education by Yang, Xiaoming, Samsudin, Shamsulariffin, Wang, Yuxuan, Yuan, Yubin, Tengku Kamalden, Tengku Fadilah, Yaakob, Sam Shor Nahar

    Published 2023
    “…This exploration innovatively proposes a method based on the convolutional neural network (CNN) to mine the target information in underwater camera data. …”
    Get full text
    Get full text
    Article
  8. 8

    Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri by Sobri, Nor Syuhaila

    Published 2007
    “…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Prayer hall vacancy detection by Ab Razak, Muhammad Naqib Syahmi, Mohamad, Muhammad Imran, Handayani, Dini Oktarina Dwi, Attarbashi, Zainab S., Hakiem Afrizal, Sandra, Suryady, Zeldi

    Published 2023
    “…The proposed system is based on the YOLOv5 object detection algorithm the Centroid Tracker object tracking algorithm and an existing object counting method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    A Review on Minutiae Extraction of Fingerprint by Rozita, Mohd Yusof, Norrozila, Sulaiman

    Published 2013
    “…A lot of researchers proposed an algorithm or a technique for the minutiae extraction. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment by Xing, Wan

    Published 2025
    “…Additionally, a Font Enhancement (FE) network based on Generative Adversarial Networks (GAN) has been introduced, which significantly undermines the interference in text CAPTCHAs. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction by Hui, Ng Suk

    Published 2024
    “…Q.Clear, a Bayesian Penalised Likelihood (BPL) algorithm, has demonstrated notable advancements in clinical image quality and quantification, particularly in detecting subtle abnormalities. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism by YAN, ZUO

    Published 2025
    “…Results demonstrate that the improved YOLOv8 model achieves a detection accuracy of 82.71%, significantly reducing the need for manual video review and labor costs associated with traditional invigilation methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Employing Artificial Intelligence to Minimize Internet Fraud by Wong, E.S.K.

    Published 2009
    “…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
    Get full text
    Get full text
    Article
  15. 15

    Network security risk assessment based on fuzzy logic approach / Nurulhidayah Abdul Latif by Abdul Latif, Nurulhidayah

    Published 2012
    “…The qualitative method that leads to the understanding and holistic description of a phenomenon was applied in this study. This method generates rich, detail data from a multiple perspectives. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs) by Baashar Y., Alkawsi G., Mustafa A., Alkahtani A.A., Alsariera Y.A., Ali A.Q., Hashim W., Tiong S.K.

    Published 2023
    “…This study also attempts to capture a pattern of the most used ANN techniques and algorithms. …”
    Article
  17. 17

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Serious game intelligent transportation system based on internet of things by Fressy, Nugroho, Asto Buditjahjanto, I Gusti Putu, Pebrianti, Dwi, Hammad, Jehad A. H, Moch, Fachri, Lestari, Tri Mukti, Maharani, Dian, Nurrahman, Alfina

    Published 2026
    “…The method calculates character skill values across multiple criteria and generates rankings of the best characters according to game environment conditions derived from closed-circuit television (CCTV) based traffic detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis