Search Results - (( user evaluation method algorithm ) OR ( features detection method algorithm ))

Refine Results
  1. 1

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…All the features of emphasized words detect by user is extracted. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Defining features in detecting malicious web pages is a vital condition in order to generate accurate detection result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An improved framework for content and link-based web spam detection: a combined approach by Shahzad, Asim

    Published 2021
    “…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…For algorithm performance evaluation, the ML-IDS is compared with ML-CICIDS-59 and ML-CICIDS-45, which are IDS trained using the CICIDS-2018 dataset after performing feature engineering. …”
    text::Thesis
  7. 7

    A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent by Kong, Jun Hao

    Published 2023
    “…Hence, a feature selection method is necessary to pick the right features. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Ischemic Stroke Detection System With Computer Aided Diagnostic Capability by Lina, Tay

    Published 2017
    “…The performance evaluations of the detection methods are measured by accuracy percentage and processing time. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Accurate Real Time Detection For Halal Logo Based On Fourier Magnitude Method by Ismail, Nurul Atiqah

    Published 2016
    “…In the first stage, the evaluations of the existing object detection methods in Android Smartphone is conducted. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Image Based Oil Palm Tree Crowns Detection by Muhammad Afif Zakwan, Zaili

    Published 2020
    “…This system the main features is to detect the crowns of oil palm tree by drawing circle on it and covers the feature of counting for every single detection that has been made as an evaluation to ensure the system is completely done. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The algorithm is validated by conducting manual ground truth and the results were compared with the closest and well-known methods. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin by Basiruddin, Nurul Hafiza

    Published 2021
    “…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity by Yau, Jia Xin

    Published 2023
    “…Consequently, it is critical to identify effective detection techniques for fraudulent websites. The research consists of analysing the characteristics of phishing websites, extracting their essential features using the wrapper method, and classifying websites as phishing or legitimate using supervised and unsupervised learning algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Building extraction for 3D city modelling using infused airborne LiDAR and high-resolution aerial photograph by Sani, Ojogbane Success

    Published 2021
    “…In the first instance, LiDAR derivatives were employed via an image algorithm to perform the detection of buildings. Our method achieved promising results over a large scene with completeness, correctness, and the quality matrix we have for the object-based evaluation average values were 97%, 99% and 99%, respectively. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…Thus, some phases of SDLC were used and the chosen phases such as requirement analysis, design, development, evaluating and documentation. This project are focuses on the FitwithTrainer android application with auto-formation group chatting as it is use geofencing technique in GPS to detect the nearest users. …”
    Get full text
    Get full text
    Student Project
  20. 20