Search Results - (( mobile detection method algorithm ) OR ( image classification bayes algorithm ))*
Search alternatives:
- image classification »
- classification bayes »
- mobile detection »
- method algorithm »
- bayes algorithm »
-
1
Identifying Damage Types in Solar Panels Through Surface Image Analysis with Naive Bayes
Published 2024“…This study investigates the utilization of statistical feature extraction methods alongside Bernoulli Naive Bayes (BNB) and Gaussian Naive Bayes (GNB) algorithms to categorize different defect types, such as cracks, scratches, spots, and non-defective surfaces, through digital image analysis. …”
Get full text
Get full text
Get full text
Journal -
2
The Contribution of Feature Selection and Morphological Operation For On-Line Business System’s Image Classification
Published 2015“…Classification process is part of the important phase in automatic image annotation (AIA). …”
Get full text
Get full text
Get full text
Article -
3
Urban landcover features identification utilizing multiband combinations and multi-level image segmentation for objectbased classification / Nurhanisah Hashim
Published 2018“…Twelve segmentation levels were constructed in order to create meaningful image objects before going through the classification process. …”
Get full text
Get full text
Thesis -
4
Improving Brain MR Image Classification for Tumor Segmentation using Phase Congruency
Published 2018“…Methods: The skull part is removed from brain MR image by applying converging square algorithm and phase congruency based edge detection method. …”
Get full text
Get full text
Get full text
Article -
5
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The accuracy value shows that the KNN algorithm is better when compared to the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Characterisation of pineapple cultivars under different storage conditions using infrared thermal imaging coupled with machine learning algorithms
Published 2022“…The non-invasive ability of infrared thermal imaging has gained interest in various food classification and recognition tasks. …”
Get full text
Get full text
Article -
7
Classification of gram-positive and gram-negative bacterial images based on machine learning algorithm
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Pixel-based feature for android malware family classification using machine learning algorithms
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
Get full text
Get full text
Thesis -
10
A Steganalysis Classification Algorithm Based on Distinctive Texture Features
Published 2023“…As a result, distinguishing between the two symmetric images required the development of methods. Steganalysis is a technique for identifying hidden messages embedded in digital material without having to know the embedding algorithm or the �non-stego� image. …”
Article -
11
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
Get full text
Get full text
Get full text
Article -
12
Phishing image spam classification research trends: Survey and open issues
Published 2020“…At present, the email is submerged with spam content, both in text-based form or undesired text planted inside the images. This study reviews articles on phishing image spam classification published from 2006 to 2020 based on spam classification application domains, datasets, features sets, spam classification methods, and the measurement metrics adopted in the existing studies. …”
Get full text
Get full text
Article -
13
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…This research presents a mobile malware static detection method based on Naive Bayes. …”
Get full text
Get full text
Thesis -
15
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
16
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
17
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
18
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
19
Uncovering user perceptions toward digital banks in Indonesia: A Naïve Bayes sentiment analysis of twitter data
Published 2023“…The subsequent stages involved classification using the Naïve Bayes algorithm and word cloud visualization to identify the most commonly used words based on user responses. …”
Get full text
Get full text
Get full text
Article -
20
Optimizing the performance of mobile malware detection using the indexing rule
Published 2024journal::journal article
