Search Results - (( java _ prevention algorithm ) OR ( parametric classification based algorithm ))

Refine Results
  1. 1
  2. 2

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…The second stage involved assessing the spatial resolution effect through utilizing Landsat 8 (30 m) and Sentinel (10 m) data on LCM accuracy using SVM, K-Nearest Neighbor (K-NN), Random Forest (RF), and Neural Network (NN) algorithms. Based on the concluding overall analysis, the classification accuracy derived from Sentinel 2 imagery utilizing SVM and RF, Landsat 8 applying SVM donated higher than other methods of classification. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Nearest neighbour group-based classification by Samsudin, Noor A., Bradley, Andrew P.

    Published 2010
    “…In this paper, we extend three variants of the nearest neighbour algorithm to develop a number of non-parametric group-based classification techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Validation on an enhanced dendrite cell algorithm using statistical analysis by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Abd Wahab, Mohd Helmy

    Published 2017
    “…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…The experimental results are also thoroughly evaluated and verified via non-parametric statistical analysis. Based on the obtained experimental results, the OGC, DPSO, and VDEO frameworks achieved an average enhancement up to 24.36%, 9.38%, and 11.98% of classification accuracy, respectively. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…Previously, there is limited work on the clustering and classification of biologically active compounds into their activity based classes using fuzzy and neural network. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Oil palm mapping over Peninsular Malaysia using Google Earth Engine and machine learning algorithms by Shaharum, Nur Shafira Nisa, Mohd Shafri, Helmi Zulhaidi, Wan Ab. Karim Ghani, Wan Azlina, Samsatli, Sheila, Al-Habshi, Mohammed Mustafa, Yusuf, Badronnisa

    Published 2020
    “…In this study, 30 m Landsat 8 data were processed using a cloud computing platform of Google Earth Engine (GEE) in order to classify oil palm land cover using non-parametric machine learning algorithms such as Support Vector Machine (SVM), Classification and Regression Tree (CART) and Random Forest (RF) for the first time over Peninsular Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hybrid conjugate gradient using exact line search in photovoltaic system / Muhammad Ariiq Iqbaal Azizul Firdaus by Azizul Firdaus, Muhammad Ariiq Iqbaal

    Published 2025
    “…Various studies have been undertaken by implementing the CG method in image restoration, optimal rocket landing guidance and motion control field. There are a few classifications of CG method such as classical, hybrid, three-term and parametric CG methods. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  14. 14

    Skin Colour Detection Based On An Adaptive Multi-Thresholding Technique by Mharib, Ahmed M.

    Published 2007
    “…The model is based on the bivariate normal distribution of the skin chromatic subspace. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Computational analysis of biological data: Where are we? by Soreq, Lilach, Mohamed, Wael Mohamed Yousef

    Published 2024
    “…Using computational modeling, classification algorithms can be applied to microarray and RNA sequencing data (such as hierarchical clustering - HCL, t-SNE and principal component analysis - PCA), and high-resolution images can be generated based on the analyzed data and patient samples. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…While much research has been conducted, focusing on the development of algorithms and techniques for HAR, less emphasis was placed on the improvement of HAR research’s efficiency in terms of sensor data collection, annotation, and storage, resulting in the use of incomplete, inefficient, and time-consuming data engineering systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis