Search Results - (( using detection method algorithm ) OR ( using classification issues algorithm ))

Refine Results
  1. 1

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…Automatic diagnostic methods were frequently used to conduct breast cancer diagnoses in order to increase the accuracy and speed of detection. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons by Ghanem, Waheed Ali H. M., Aman, Jantan, Ahmed Ghaleb, Sanaa Abduljabbar, Naseer, Abdullah B.

    Published 2020
    “…One of the most persistent challenges concerning network security is to build a model capable of detecting intrusions in network systems. The issue has been extensively addressed in uncountable researches and using various techniques, of which a commonly used technique is that based on detecting intrusions in contrast to normal network traffic and the classification of network packets as either normal or abnormal. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
    Article
  6. 6

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Deep learning object detector using a combination of Convolutional Neural Network (CNN) architecture (MiniVGGNet) and classic object detection algorithm by Ismail, Asmida, Ahmad, Siti Anom, Che Soh, Azura, Hassan, Mohd Khair, Harith, Hazreen Haizi

    Published 2020
    “…The performance of this method can work in some specific use cases and effectively solving the problem of the inaccurate classification and detection of typical features.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Experimental results show that the developed methods and model are able to classify the Harumanis quality with accuracy of 79% using fuzzy classification based on shape and size.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  13. 13

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…Conclusion/Recommendation: The result of detecting duplicate records with different classification techniques tends to fluctuate depending on the dataset which is used. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Pattern Recognition for Human Diseases Classification in Spectral Analysis by Nur Hasshima Hasbi, Abdullah Bade, Fuei, Pien Chee, Muhammad Izzuddin Rumaling

    Published 2022
    “…On the other hand, classification methods are techniques or algorithms used to group samples into a predetermined category. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Analysis of artificial neural network and viola-jones algorithm based moving object detection by Rashidan, M. Ariff, Mohd Mustafah, Yasir, Zainal Abidin, Zulkifli, Zainuddin, N. Afiqah, A. Aziz, Nor Nadirah

    Published 2014
    “…Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Identifying diseases and diagnosis using machine learning by Iswanto I., Laxmi Lydia E., Shankar K., Nguyen P.T., Hashim W., Maseleno A.

    Published 2023
    “…It uses are many dimensionality reduction algorithms and classification algorithms. …”
    Article
  18. 18

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…Classifier algorithms, namely the Support Vector Machine and K-Nearest Neighbours were used for benchmarking the performance of the Real-Valued Negative Selection Algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail

    Published 2023
    “…The advantages of both algorithms are used to balance the exploration and exploitation in the searching process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article