Search Results - (( legal detection system algorithm ) OR ( spider optimisation based algorithm ))
Search alternatives:
- optimisation based »
- system algorithm »
- legal detection »
-
1
-
2
-
3
The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm
Published 2020“…Therefore, this paper proposed a Black Widow Optimisation (BWO) algorithm inspired by the bizarre mating behaviour of a spider as the method to use to solve the problem. …”
Get full text
Get full text
Get full text
Article -
4
Real-time vision-based Malaysian road sign recognition using an artificial neural network / Kh Tohidul Islam
Published 2017“…All these algorithms are tested using thousands of images. The hybrid color segmentation algorithm has eventually been chosen for this proposed system as it shows the best performance for detection of road signs. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
Get full text
Get full text
Thesis -
6
Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which, the legal and illegal behaviours could identify. …”
Get full text
Get full text
Get full text
Article -
7
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…Since such image are used for early detection of numbers of ocular disease which still remain the legal cause of blindness in working age population. …”
Get full text
Get full text
Monograph -
8
Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
Published 2010“…In a nutshell, most of these systems are poor in terms of achieving the security requirements, while on the other side, most of the systems have not discussed the patients' rights and how the system can detect the persons who broadcast these records.…”
Get full text
Article -
9
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…This integrated classifier algorithm applied to analyse, classify and generate rules of the pattern and program behaviour of system call information in which the legal and illegal behaviours could identified. …”
Get full text
Get full text
Get full text
Technical Report -
10
Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants
Published 2023“…The paper offers two types of comparisons from distinct perspectives: firstly, the performance of each algorithm in predicting real cases of anti-money laundering compliance, and secondly, the contribution of attributes measured by weights of correlation in different algorithms. …”
Get full text
Get full text
Article -
11
A novel approach towards tamper detection of digital holy Quran generation
Published 2020“…The results obtained from the application show higher performance. The system achieved the detection accuracy of 95.9% and 95% by Jaro-Winkler and Difflib, respectively along with the precision of 93.29% and 96% in the case of diacritics. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
