Search Results - (( web application solar algorithm ) OR ( _ ((relation based) OR (detection based)) algorithm ))*

Refine Results
  1. 1
  2. 2

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Neural network algorithm-based fall detection modelling by Mohd Yusoff, Ainul Husna, Koh, Cheng Zhi, Ngadimon, Khairulnizam, Md Salleh, Salihatun

    Published 2020
    “…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm by Arif, Hanafi, Sulaiman, Harun, Enggari, Sofika, Rani, Larissa Navia

    Published 2016
    “…This paper underlines the issues related with dirty data, detection of duplicatein email column. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi by Nur Fadzilah, Mohamad Radzi

    Published 2013
    “…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm by Rahman, MZA, Madihah Mohd Saudi

    Published 2024
    “…Furthermore, this paper also discusses the challenges and the potential research for future work with relate of the genetic algorithm. This research paper can be used as a reference and guidance for further study on mobile botnet detection techniques.…”
    Proceedings Paper
  10. 10

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…Microarray-based cancer biomarker detection is one of the popular trends for cancer classification. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…The proposed algorithm considered features based on its level of importance where weight given based on number of features involved in the sample. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification by Kamaruddin, B., Zabiri, H., Mohd Amiruddin, A.A.A., Teh, W.K., Ramasamy, M., Jeremiah, S.S.

    Published 2020
    “…In most methods for shape-based stiction detection, they rely heavily on the traditional controller output (OP) and process variable (PV) plot (i.e. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, M. Mahadi

    Published 2018
    “…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, Muhammad Mahadi

    Published 2018
    “…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat by Selamat, Nur Syuhada

    Published 2021
    “…The most common method of detecting malware relies on signature-based detection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper