Search Results - (( _ detection method algorithm ) OR ( based education a algorithm ))
Search alternatives:
- method algorithm »
- education a »
- a algorithm »
-
1
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
2
The application of suitable sports games for junior high school students based on deep learning and artificial intelligence
Published 2025“…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
Get full text
Get full text
Get full text
Article -
3
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A novel hybrid edge detection algorithm based on wavelet thresholding and ICA
Published 2012Get full text
Working Paper -
5
-
6
N/A and signature analysis for malwares detection and removal
Published 2019“…Therefore, this study suggested N/A detection technique as the dynamic method (behaviour-based detection method) that depends on the Windows Registry (system database). …”
Get full text
Get full text
Get full text
Article -
7
Application of target detection method based on convolutional neural network in sustainable outdoor education
Published 2023“…This exploration innovatively proposes a method based on the convolutional neural network (CNN) to mine the target information in underwater camera data. …”
Get full text
Get full text
Article -
8
Enabling live video technology for distance learning using IP based camera / Nor Syuhaila Sobri
Published 2007“…This elicitation is used the scenario-based technique to identify the requirement. We also proposed algorithm of bandwidth detection in order to detect the bandwidth of a current network. …”
Get full text
Get full text
Thesis -
9
Prayer hall vacancy detection
Published 2023“…The proposed system is based on the YOLOv5 object detection algorithm the Centroid Tracker object tracking algorithm and an existing object counting method. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
A Review on Minutiae Extraction of Fingerprint
Published 2013“…A lot of researchers proposed an algorithm or a technique for the minutiae extraction. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment
Published 2025“…Additionally, a Font Enhancement (FE) network based on Generative Adversarial Networks (GAN) has been introduced, which significantly undermines the interference in text CAPTCHAs. …”
Get full text
Get full text
Thesis -
12
Qualitative and quantitative accuracy evaluation of 18f-fdg PET/CT with TOF and NON-TOF system on beta value in BPL reconstruction
Published 2024“…Q.Clear, a Bayesian Penalised Likelihood (BPL) algorithm, has demonstrated notable advancements in clinical image quality and quantification, particularly in detecting subtle abnormalities. …”
Get full text
Get full text
Monograph -
13
Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism
Published 2025“…Results demonstrate that the improved YOLOv8 model achieves a detection accuracy of 82.71%, significantly reducing the need for manual video review and labor costs associated with traditional invigilation methods. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
15
Network security risk assessment based on fuzzy logic approach / Nurulhidayah Abdul Latif
Published 2012“…The qualitative method that leads to the understanding and holistic description of a phenomenon was applied in this study. This method generates rich, detail data from a multiple perspectives. …”
Get full text
Get full text
Thesis -
16
Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs)
Published 2023“…This study also attempts to capture a pattern of the most used ANN techniques and algorithms. …”
Article -
17
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
18
Serious game intelligent transportation system based on internet of things
Published 2026“…The method calculates character skill values across multiple criteria and generates rankings of the best characters according to game environment conditions derived from closed-circuit television (CCTV) based traffic detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis
