Search Results - (( data detection based algorithm ) OR ( program segmentation using algorithm ))

Refine Results
  1. 1

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Road lane detection using h-maxima and improved hough transform by Kamarul Hawari, Ghazali, Xiao, Rui, Ma, Jie

    Published 2012
    “…A fast and improved algorithm with the ability to detect unexpected lane changes is aimed in this paper. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Vision-Based Autonomous Vehicle Driving Control System by Isa, Khalid

    Published 2005
    “…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Vision-based autonomous vehicle driving control system by Isa, Khalid

    Published 2005
    “…The important contribution of this study is the development of vehicle lane detection and tracking algorithm based on colour cue segmentation, Canny edge detection and Hough transform. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset by Chiang, Yi Fan

    Published 2017
    “…In post-processing, the contour of liver is smooth by binary Gaussian filter. The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm by Arif, Hanafi, Sulaiman, Harun, Enggari, Sofika, Rani, Larissa Navia

    Published 2016
    “…It provides an algorithm to the discovery of error and duplicates entries in the data sets of existing data warehouse. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…However, the current DBN.NIDS model is still ineffective for large-scale real-world data due to some issues: 1) the pre-training of the DBN algorithm includes simple feature learning which does not work very well to extract important features from the attack data, 2) the classification task of the DBN algorithm is a poor detection for imbalanced class dataset and 3) the design of the DBN model could be weak and need to be continuously updated by modern definitions of abnormal to detect recent attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article