Search Results - (( model validation learning algorithm ) OR ( _ information security algorithm ))*

Search alternatives:

Refine Results
  1. 1

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…The total work is completed by the selection, assessment, and implementation of the Machine Learning (ML) model, and finally, proposed the crime prediction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning by Sia, Ken Yen

    Published 2022
    “…The project will use natural language processing in extracting certain features as the input of an algorithm to generate a reputation score that will be trained using machine learning to build the detection model. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Then, the natural language processing (NLP) algorithm was applied to the unique data column and extracted a huge number of useful data features in terms of meaningful text information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    ReSTiNet: An efficient deep learning approach to improve human detection accuracy by Shahriar Shakir, Sumi, Dayang Rohaya, Awang Rambli, Mirjalili, Seyedali, Miah, M. Saef Ullah, Muhammad Mudassir, Ejaz

    Published 2023
    “…It is one of the most important tasks in global security and safety monitoring. In recent days, Deep Learning has improved human detection technology. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    ReSTiNet: An Efficient Deep Learning Approach to Improve Human Detection Accuracy by Sumit, S.S., Rambli, D.R.A., Mirjalili, S., Miah, M.S.U., Ejaz, M.M.

    Published 2023
    “…It is one of the most important tasks in global security and safety monitoring. In recent days, Deep Learning has improved human detection technology. …”
    Get full text
    Get full text
    Article
  10. 10

    ReSTiNet : An efficient deep learning approach to improve human detection accuracy by Sumit, Shahriar Shakir, Dayang Rohaya, Awang Rambli, Seyedali, Mirjalili, Miah, Md Saef Ullah, Muhammad Mudassir, Ejaz

    Published 2023
    “…It is one of the most important tasks in global security and safety monitoring. In recent days, Deep Learning has improved human detection technology. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…High level security has nurtured the arisen of Electroencephalograms (EEG) signals as a noteworthy biometrics modality for person authentication modelling. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A conceptual framework for a lightweight AI system for skin disease risk prediction using epidemiological data in rural Bangladesh by Islam, Mohammad Raihanul, Abdul Kadir, Andi Fitriah, Ismail, Syazwan Aizat

    Published 2026
    “…The framework incorporates environmental, occupational, hygiene-related, and living-condition factors to model individual risk profiles. Preliminary experiments conducted on an existing dataset demonstrate that conventional machine learning algorithms, particularly K-Nearest Neighbors (KNN) and Random Forest, achieve strong predictive performance, with accuracy reaching up to 88% in train–test evaluations and 80% in 10-fold cross-validation. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model by Ouwabunmi, Babalola AbdulHafeez

    Published 2025
    “…This study presents the development and evaluation of a novel hybrid machine learning algorithm that integrates the strengths of Random Forest and Gradient Boosting models to enhance the prediction of smORFs. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Approach For Optimizing Course Recommendation Based On Integrating Modified Felder-Silverman Learning Style Model With Meta-Heuristics Algorithm by Ashraf, Erum

    Published 2023
    “…It involves identifying potential courses learning style, validated through genetic and surrogate meta-heuristics optimization algorithms, and employing Felder-Silverman model for learning style identification. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Lane detection in autonomous vehicles : A systematic review by Noor Jannah, Zakaria, Mohd Ibrahim, Shapiai, Rasli, Abd Ghani, Mohd Najib, Mohd Yassin, Mohd Zamri, Ibrahim, Nurbaiti, Wahid

    Published 2023
    “…In the meantime, the methodologies include geometric modeling and traditional methods, while AI includes deep learning and machine learning. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…In the cycle of Industrial Revolution 4.0 (IR 4.0), many issues in the industries can be solved with implementation of artificial intelligence approaches, including machine learning models. Designing an effective machine learning model for prediction and classification problems is a continuous effort. …”
    Get full text
    Get full text
    Conference or Workshop Item