Search Results - (( based detection method algorithm ) OR ( data (replication OR implication) based algorithm ))

Refine Results
  1. 1
  2. 2

    A hybrid deep learning-based unsupervised anomaly detection in high dimensional data by Muneer, A., Taib, S.M., Fati, S.M., Balogun, A.O., Aziz, I.A.

    Published 2022
    “…Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
    Get full text
    Get full text
    Article
  9. 9

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
    Get full text
    Get full text
    Monograph
  13. 13
  14. 14

    Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud by Aldailamy, Ali Y., Muhammed, Abdullah, Latip, Rohaya, Hamid, Nor Asilah Wati Abdul, Ismail, Waidah

    Published 2024
    “…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An adaptive data replication and placement for efficient data storage of online social networks using two-tier multi-cloud environment by Al-Dailamy, Ali Y., Muhammed, Abdullah, Latip, Rohaya, Abdul Hamid, Nor Asila Wati, Esmail, Waidah

    Published 2022
    “…The second algorithm is Dynamic Exponential Time (DET) which determines the data object replication and placement based on exponential time periods. …”
    Get full text
    Get full text
    Article
  16. 16

    Oil palm USB (Unstripped Bunch) detector trained on synthetic images generated by PGGAN by Wahyu, Sapto Aji, Kamarul Hawari, Ghazali, Son, Ali Akbar

    Published 2023
    “…Specifically, we leverage the Faster R-CNN (Region-based Convolution Neural Network), a robust object detection algorithm, and complement it with Progressive Growing Generative Adversarial Networks (PGGAN) for synthetic image generation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of a hybrid machine learning model for rockfall source and hazard assessment using laser scanning data and GIS by Fanos, Ali Mutar

    Published 2019
    “…The proposed BANN model achieved the best training accuracies of (95%) and best prediction accuracies of (92%) based on testing data compared to other employed methods. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Dynamic replication algorithm in data grid: Survey by K. Madi, Mohammed, Hassan, Suhaidi

    Published 2008
    “…A dynamic replication model based on mathematical concepts is proposed. …”
    Get full text
    Get full text
    Get full text
    Book Section
  19. 19

    Development of gesture-controlled robotic arm for upper limb hemiplegia therapy by Wan Azlan, Wan Norliyana

    Published 2022
    “…Many engineering challenges are addressed to develop a viable system for the therapy application: a real-time and accurate system for hand movement detection, limitation of robot workspace and hand-robot coordination, and development of hand motion-based robot position algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The use of three to five transactions is in NRG the data will be replicated into three to five sites. …”
    Get full text
    Get full text
    Thesis