Search Results - (( data implication learning algorithm ) OR ( using detection method algorithm ))

Refine Results
  1. 1

    A hybrid deep learning-based unsupervised anomaly detection in high dimensional data by Muneer, A., Taib, S.M., Fati, S.M., Balogun, A.O., Aziz, I.A.

    Published 2022
    “…The first is the dataset class imbalance, which solved using SMOTE technique. The second issue is the poor performance, which can be solved using one of the optimization algorithms. …”
    Get full text
    Get full text
    Article
  2. 2

    Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff by Usok @ Yusoff, Hanin Hanisah

    Published 2024
    “…A user-friendly desktop system is created for input of facial photos and receiving immediate age estimation results, illustrating machine learning's assure in age identification. With implications for personalised services and security, this experiment demonstrates how CNN algorithms improve accuracy, adding to successful age-related technology.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows by Zhang, Shasha, Dong, Qiming, Yasin, Megat Al Imran, Fang, Ng Chwee

    Published 2026
    “…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
    Get full text
    Get full text
    Article
  6. 6

    XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection by Bouke, Mohamed Aly, Alramli, Omar Imhemed, Abdullah, Azizol

    Published 2024
    “…Traditional machine learning algorithms such as Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Trees (DT), and Support Vector Machines (SVM) have been employed to mitigate this challenge. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…One of the embedded systems that received great attention is road detection system, that operates using road markings detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…The algorithm employs the First Lag Autocorrelation and the Modified Sample Entropy methods to detect and classify weak hand closing and opening muscle activities by using signal obtained from the Flexor Carpi Ulnaris forearm muscle. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Obfuscated Malware Detection: Impacts on Detection Methods by Gorment N.Z., Selamat A., Krejcar O.

    Published 2024
    “…This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. …”
    Conference Paper
  17. 17

    Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images by Elaraby, Ahmed, Al-Ameen, Zohair

    Published 2022
    “…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
    Get full text
    Get full text
    Article
  18. 18

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  20. 20