Search Results - (( based detection method algorithm ) OR ( online information systems algorithm ))*
Search alternatives:
- online information »
- systems algorithm »
- method algorithm »
- based detection »
-
1
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Phishing attack detection using machine learning method
Published 2019“…This is very dangerous, especially to the important organizations because hackers can disable the online system in the company, steal confidential information and subsequently steal company money through online without being aware of any one. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
SMART: a subspace based malicious peers detection algorithm for P2P systems
Published 2013“…Firstly, we define malicious peers and show their influence on the system performance. Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. …”
Get full text
Get full text
Get full text
Article -
4
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. …”
Get full text
Get full text
Monograph -
5
Vader lexicon and support vector machine algorithm to detect customer sentiment orientation
Published 2023“…Additionally, the study showcases the novelty and superiority of the annotation process used for detecting customer orientation classifications. Methods: This study employs a method to compare the classification performance of the Vader lexicon annotation process with manual annotation. …”
Get full text
Get full text
Get full text
Article -
6
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research proposed two web page recommendation systems. The first is iPACT, an improved recommendation system based on PACT methodology to demonstrate the prediction accuracy of the proposed enhanced classification algorithm in this research. …”
Get full text
Get full text
Thesis -
7
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
8
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…In this thesis, the accuracy of the proposed algorithm was evaluated using two standard online benchmarking database systems. …”
Get full text
Get full text
Get full text
Thesis -
9
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…The purpose of this study is to answer questions about text-based depression detection based on people who depressive behavior might have shown in their social media postings. …”
Conference Paper -
10
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The stream clustering stage consists of two phases: the online and the offline phases. In the online phase, the stream clustering algorithm for trajectories based on the lifespan of the cluster is proposed (CC_TRS) to overcome the limitations of the time window technique. …”
Get full text
Get full text
Thesis -
11
Image processing-based flood detection
Published 2019“…The citizens will get the information if they follow that account (early warning system) on Twitter. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The accuracy value shows that the KNN algorithm is better when compared to the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…First of all, the method to learn large-scale stream data must be solved before implementing it in the detection system. …”
Get full text
Get full text
Thesis -
14
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
15
Detection of sweetness level for fruits (watermelon) with machine learning
Published 2020“…This study applies image processing techniques to detect the color and shape of watermelon’s skin for grading based on the sweetness level using K-means clustering method via the Python platform. 13 samples of watermelon images are used to test the functionality of the proposed detection system in this study. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
17
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…Thus image compression is a key factor to improve transmission speed and storage, but it risks losing relevant terrain information. Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
Get full text
Get full text
Thesis -
18
-
19
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
20
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project
