Search Results - (( data evaluation method algorithm ) OR ( features detection method algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…TVS algorithm design is still challenging because most of the recent methods are unable to achieve robust detection for different types of transitions: hard transition (HT) and soft transition (ST). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System by Al-Hameli, Bassam Abdo, Alsewari, Abdulrahman A., Alraddadi, Abdulaziz Saleh, Aldhaqm, Arafat

    Published 2021
    “…Sensitivity, specificity, and accuracy have been measured to evaluate the results. The results achieved indicate that the proposed method with an accuracy of 91.65% outperformed the results of the earlier methods examined in this article.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The proposed algorithms were evaluated to test their speed in handling streaming data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fast temporal video segmentation based on Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H., Al-Haddad, Syed Abdul Rahman, Saripan, M. Iqbal, Mahmood, Basheera M., Hussien, Aseel

    Published 2020
    “…TVS algorithm design is still challenging because most of the recent methods are unable to achieve fast and robust detection. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A fast feature extraction algorithm for image and video processing by Abdulhussain, Sadiq H., Ramli, Abdul Rahman, Mahmmod, Basheera M., Saripan, M. Iqbal, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Baker, Thar, Flayyih, Wameedh Nazar, Jassim, Wissam A.

    Published 2019
    “…Furthermore, the proposed method is employed for shot boundary detection (SBD) applications to detect transitions in video frames. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Using our proposed method, the four stages of ECG classification, i.e., QRS detection, preprocessing, feature extraction, and classification, were reduced to two steps only, i.e., QRS detection and classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Compared to several decision tree method, Random Forest has shown promising and higher sensitivity result towards malicious data which is 98.3% compared to other classification algorithm…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…However, the performance of deep learning methods is also affected by limitations such as dimensionality, sparsity, and feature dominance inherent in microbiome data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Spectral texture segmentation of Magnetic Resonance Imaging (MRI) brain images for glioma brain tumour detection / Rosniza Roslan by Roslan, Rosniza

    Published 2013
    “…Therefore, texture energy features and Fuzzy C-Means clustering method are identified as promising methods of glioma brain tumour detection at an accuracy rate of 76%, 86% and 79% is detected as an abnormal of Tl- Weighted, T2-Weighted and FLAIR images. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  17. 17

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This study introduces a novel framework for identifying Twitter spam data based on machine learning algorithms. By initializing data pre-processing for clean-up, noise removal, and unpredictable unfinished data, reducing the number of features in the tweet dataset using mutual information is the study's methods. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. …”
    Get full text
    Get full text
    Get full text
    Thesis