Search Results - evolution ((detection techniques) OR (learning techniques))
Search alternatives:
- detection techniques »
-
1
Critical review of object detection techniques for traffic light detection in intelligent transportation systems
Published 2025“…This study provides a critical review of object detection techniques specifically for traffic light detection, evaluating the evolution of machine learning frameworks, deep learning architectures, and hybrid optimization models. …”
Get full text
Get full text
Get full text
Article -
2
Development of an islanding detection scheme based on combination of slantlet transform and ridgelet probabilistic neural network in distributed generation
Published 2019“…In this work, a new islanding detection technique is proposed based on combination of Slantlet Transform and Ridgelet Probabilistic Neural Network to detect islanding conditions from other disturbance for a 250-kW PV array connected to a typical North American distribution grid and a wind farm power generation system. …”
Get full text
Get full text
Thesis -
3
Comparison of detection model using machine learning on android malware / Muhammad Ikmal Ihsan
Published 2022“…This project utilized supervised machine learning techniques such as SVMs, Naive Bayes and Random Forest to build an android malware detection model. …”
Get full text
Get full text
Student Project -
4
Driving fatigue detection system using haar cascade technique
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Object detection and classification using few-shot learning in smart agriculture: A scoping mini review
Published 2022“…One of the techniques that is popular is Few-Shot Learning (FSL). …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Enhanced Parallel Deep Learning for Malware Detection (EPDL-MD) Model
Published 2026journal::journal article -
7
A joint learning classification for intent detection and slot filling from classical to deep learning: a review
Published 2025“…This study explores the evolution of joint learning models for intent detection and slot filling from 2008 to 2024, covering both classical and deep learning approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…One of the most dynamic areas in AI research is object detection, a field that continues to evolve due to advancements in chip computing power and deep learning techniques. …”
Get full text
Get full text
Article -
9
Deep learning detector for pests and plant disease recognition
Published 2020“…However, in this project, deep learning techniques are used in developing a model for diseases and pest detection in plants, and then train and test the model before eventually integrating the model into a mobile application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
11
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…To solve the problem, this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning-enhanced jewelry material jadeite jade quality assessment
Published 2024“…Jadeite jade, renowned for its unique texture and cultural significance, stands as the epitome of jade varieties, embodying the latest evolution of China’s jade culture. This research endeavors to establish an AI model for precisely screening jadeite quality, employing deep learning techniques to revolutionize jadeite design and detection. …”
Get full text
Get full text
Article -
13
A novel approach based on machine learning and public engagement to predict water-scarcity risk in urban areas
Published 2022“…Due to the complex urban fabric, conventional techniques should be developed to diagnose water shortage risk (WSR) by engaging crowdsourcing. …”
Get full text
Get full text
Article -
14
-
15
A static analysis approach for android permission-based malware detection systems
Published 2021“…This study proposes machine learning with different sets of classifiers was used to evaluate Android malware detection. …”
Get full text
Get full text
Get full text
Article -
16
Chronic kidney disease diagnostic tools based on machine learning algorithms: a review / Muhamad Huzaimi Abdul Ghafar ... [et al.]
Published 2025“…This paper aims to explore the potential of Artificial Intelligence (AI) tools, specifically machine learning (ML), in revolutionizing CKD diagnosis. This work intends to enlighten the evolution of ML techniques in CKD diagnosis and their contemporary applications. …”
Get full text
Get full text
Get full text
Article -
17
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
18
Metric-based code smell detection technique for python software
Published 2018“…The first phase involves reviewing the literatures on code smells detection techniques, parser models, and code smells in Python software. …”
Get full text
Get full text
Thesis -
19
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
20
Modeling 2D appearance evolution for 3D object categorization
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper
