Search Results - (( mobile detection method algorithm ) OR ( image classification bayes algorithm ))*

Refine Results
  1. 1

    Identifying Damage Types in Solar Panels Through Surface Image Analysis with Naive Bayes by Wiliani, Ninuk, T.K.A, Rahman, Ramli, Suzaimah

    Published 2024
    “…This study investigates the utilization of statistical feature extraction methods alongside Bernoulli Naive Bayes (BNB) and Gaussian Naive Bayes (GNB) algorithms to categorize different defect types, such as cracks, scratches, spots, and non-defective surfaces, through digital image analysis. …”
    Get full text
    Get full text
    Get full text
    Journal
  2. 2
  3. 3

    Urban landcover features identification utilizing multiband combinations and multi-level image segmentation for objectbased classification / Nurhanisah Hashim by Hashim, Nurhanisah

    Published 2018
    “…Twelve segmentation levels were constructed in order to create meaningful image objects before going through the classification process. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Improving Brain MR Image Classification for Tumor Segmentation using Phase Congruency by Ghazanfar, Latif, Dayang Nur Fatimah, Binti Awg Iskandar, Jaafar, Alghazo, Arfan, Jaffar

    Published 2018
    “…Methods: The skull part is removed from brain MR image by applying converging square algorithm and phase congruency based edge detection method. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules by Wiliani, Ninuk

    Published 2023
    “…The accuracy value shows that the KNN algorithm is better when compared to the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Characterisation of pineapple cultivars under different storage conditions using infrared thermal imaging coupled with machine learning algorithms by Mohd Ali, Maimunah, Hashim, Norhashila, Abd Aziz, Samsuzana, Lasekan, Ola

    Published 2022
    “…The non-invasive ability of infrared thermal imaging has gained interest in various food classification and recognition tasks. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Steganalysis Classification Algorithm Based on Distinctive Texture Features by Hammad B.T., Ahmed I.T., Jamil N.

    Published 2023
    “…As a result, distinguishing between the two symmetric images required the development of methods. Steganalysis is a technique for identifying hidden messages embedded in digital material without having to know the embedding algorithm or the �non-stego� image. …”
    Article
  11. 11

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Phishing image spam classification research trends: Survey and open issues by John Abari, Ovye, Mohd Sani, Nor Fazlida, Khalid, Fatimah, Mohd Yunus Bin Sharum, Mohd Yunus, Mohd Ariffin, Noor Afiza

    Published 2020
    “…At present, the email is submerged with spam content, both in text-based form or undesired text planted inside the images. This study reviews articles on phishing image spam classification published from 2006 to 2020 based on spam classification application domains, datasets, features sets, spam classification methods, and the measurement metrics adopted in the existing studies. …”
    Get full text
    Get full text
    Article
  13. 13

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Uncovering user perceptions toward digital banks in Indonesia: A Naïve Bayes sentiment analysis of twitter data by Karmagatri, Mulyani, Aziz, Clarisa Fezia Amanda, Asih, Wini Rizki Purnama, Jumbri, Isma Addi

    Published 2023
    “…The subsequent stages involved classification using the Naïve Bayes algorithm and word cloud visualization to identify the most commonly used words based on user responses. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20