Search Results - (( using detection method algorithm ) OR ( knowledge implementation using algorithm ))

Refine Results
  1. 1

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…Viola-Jones algorithm is utilized for face detection. Upon acquiring the face location, the knowledge-based method is implemented to locate the eye and the mouth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. CBR Algorithm is an algorithm that can solve a new problem by remembering a previous similar situation and by reusing information and knowledge of that situation in a new situation.CBR is suit for solving the problem in Thalassaemia cases.The model is designed and prototype is developed to test the diagnosis accuracy of the model.T his application is focus on Beta Thalassaemia and Haemoglobin E Trait only.For platform, this application will be using the mobile device such as PDA. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval by Slamet, Slamet, Izzeldin, Ibrahim Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah by Salmah , Fattah

    Published 2022
    “…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks by Salmah Fattah

    Published 2022
    “…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Test case minimization applying firefly algorithm by Hashim, Nor Laily, Dawood, Yasir Salman

    Published 2018
    “…The proposed test case minimization method has the following steps: provide weight to the paths, calculate path coverage for each path, transform an immediate graph into an adjacency matrix, which later is used to apply firefly algorithm and generate optimal test cases. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Retrieval based on skin color to detect the malicious images by Nooralisa Mohd Tuah, Nuraini Jamil, Dg. Senandong Ajor

    Published 2009
    “…Unfortunately, it is far beyond our knowledge. There still a lot of current algorithms are quite successful in using low-level features of the images such as color histogram and texture. …”
    Get full text
    Get full text
    Get full text
    Research Report
  18. 18

    Road Crack Detection Using Adaptive Multi Resolution Thresholding Techniques by Othman, Zuraini, Abdullah, Azizi, Kasmin, Fauziah, Syed Ahmad, Sharifah Sakinah

    Published 2019
    “…Since threshold is one of the powerful methods used in the edge detection of an image, we have therefore proposed a modified Otsu-Canny Edge Detection Algorithm in the selection of the two threshold values as well as implemented a multi-resolution level fixed partitioning method in the analysis of the global and local threshold values of the image. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Lung Nodules Classification Using Convolutional Neural Network with Transfer Learning by Abdulrazak Yahya, Saleh, Ros Ameera, Rosdi

    Published 2023
    “…CNNs are widely used in the detection and classification of imaging tasks like CT and MRI scans. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding
  20. 20

    Artificial intelligence in diagnosing tuberculosis: a review by Meraj, Syeda Shaizadi, Yaakob, Razali, Azman, Azreen, Mohd Rum, Siti Nurulain, Ahmad Nazri, Azree Shahrel

    Published 2019
    “…In Artificial Intelligence (AI) various Machine Learning (ML) algorithms have furthered the interests in Computer-aided Detection (CADe) and Diagnosis (CADx) methods. …”
    Get full text
    Get full text
    Get full text
    Article