Search Results - (( based detection method algorithm ) OR ( based education approach algorithm ))*

Refine Results
  1. 1

    The application of suitable sports games for junior high school students based on deep learning and artificial intelligence by Ji, Xueyan, Samsudin, Shamsulariffin, Hassan, Muhammad Zarif, Farizan, Noor Hamzani, Yuan, Yubin, Chen, Wang

    Published 2025
    “…In HMDB51 dataset, the proposed average detection accuracy of ST-GCN action recognition algorithm based on MediaPipe framework reaches 88.3%. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    A Review on Minutiae Extraction of Fingerprint by Rozita, Mohd Yusof, Norrozila, Sulaiman

    Published 2013
    “…Normally, the minutiae such as ridge ending and bifurcation detection are based on segment neighboring ridges, directional of ridges block pixel. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Network security risk assessment based on fuzzy logic approach / Nurulhidayah Abdul Latif by Abdul Latif, Nurulhidayah

    Published 2012
    “…Risk assessment for the firewall will be conducted by using different approaches such as Bayesian, Dempster-Shafer Theory, Neural Network and Immunity Algorithm by utilizing more respondents in the future research.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Improved Cheating Detection in Examinations using YOLOv8 with Attention Mechanism by YAN, ZUO

    Published 2025
    “…This thesis presents an innovative approach to enhance examination fairness through automated cheating detection using an improved YOLOv8 algorithm integrated with an attention mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Serious game intelligent transportation system based on internet of things by Fressy, Nugroho, Asto Buditjahjanto, I Gusti Putu, Pebrianti, Dwi, Hammad, Jehad A. H, Moch, Fachri, Lestari, Tri Mukti, Maharani, Dian, Nurrahman, Alfina

    Published 2026
    “…The method calculates character skill values across multiple criteria and generates rankings of the best characters according to game environment conditions derived from closed-circuit television (CCTV) based traffic detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs) by Baashar Y., Alkawsi G., Mustafa A., Alkahtani A.A., Alsariera Y.A., Ali A.Q., Hashim W., Tiong S.K.

    Published 2023
    “…This study also attempts to capture a pattern of the most used ANN techniques and algorithms. Of note, the articles reviewed mainly focused on higher education. …”
    Article
  9. 9

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…This study proposes weighting method for damage detection algorithms based on the bending mode shapes for beam structures. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article