Search Results - (( user evaluation method algorithm ) OR ( features detection method algorithm ))
Search alternatives:
- features detection »
- method algorithm »
- user evaluation »
-
1
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
2
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…All the features of emphasized words detect by user is extracted. …”
Get full text
Get full text
Thesis -
3
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Defining features in detecting malicious web pages is a vital condition in order to generate accurate detection result. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…For algorithm performance evaluation, the ML-IDS is compared with ML-CICIDS-59 and ML-CICIDS-45, which are IDS trained using the CICIDS-2018 dataset after performing feature engineering. …”
text::Thesis -
7
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…Hence, a feature selection method is necessary to pick the right features. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017“…The performance evaluations of the detection methods are measured by accuracy percentage and processing time. …”
Get full text
Get full text
Monograph -
9
Accurate Real Time Detection For Halal Logo Based On Fourier Magnitude Method
Published 2016“…In the first stage, the evaluations of the existing object detection methods in Android Smartphone is conducted. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Image Based Oil Palm Tree Crowns Detection
Published 2020“…This system the main features is to detect the crowns of oil palm tree by drawing circle on it and covers the feature of counting for every single detection that has been made as an evaluation to ensure the system is completely done. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
Get full text
Get full text
Thesis -
13
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
15
Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin
Published 2021“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Thesis -
16
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
18
Building extraction for 3D city modelling using infused airborne LiDAR and high-resolution aerial photograph
Published 2021“…In the first instance, LiDAR derivatives were employed via an image algorithm to perform the detection of buildings. Our method achieved promising results over a large scene with completeness, correctness, and the quality matrix we have for the object-based evaluation average values were 97%, 99% and 99%, respectively. …”
Get full text
Get full text
Thesis -
19
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Thus, some phases of SDLC were used and the chosen phases such as requirement analysis, design, development, evaluating and documentation. This project are focuses on the FitwithTrainer android application with auto-formation group chatting as it is use geofencing technique in GPS to detect the nearest users. …”
Get full text
Get full text
Student Project -
20
