Search Results - solution ((computing techniques) OR (((detection techniques) OR (optimization techniques))))

Search alternatives:

Refine Results
  1. 1

    Malware detection through machine learning techniques by Amer, Ahmed, Abdul Aziz, Normaziah

    Published 2019
    “…We conclude that Machine Learning techniques are practical to be applied as anti-malware solutions including for Zero-day attacks.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Review of firewall optimization techniques by Shakirah, Saidin, Mohamad Fadli, Zolkipli

    Published 2018
    “…This paper review firewall optimization techniques such as data mining, anomaly detection, and traffic awareness, that have been done throughout time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Distance approximation using pivot point in narrow phase collision detection by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun

    Published 2013
    “…Each technique increase speed and accuracy of the simulation itself but depending on application, we need to have specific solution of collision detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    IoT intrusion detection using auto-encoder and machine learning techniques by Khudhu, Ahmed Ridha, Samsudin, Khairulmizam

    Published 2022
    “…Thiscould lead to a fall in local minima problems where the optimal solution is notdetermined but instead, another near-optimal solution is identified. …”
    Get full text
    Get full text
    Article
  5. 5

    An enhanced soft set data reduction using decision partition order technique by Mohammed, Mohammed Adam Taheir

    Published 2017
    “…On the other hand, the proposed Markov chain model could significantly represent the robustness of the proposed reduction technique in making the optimal decision and minimising the search domain by up to 33%. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhanced EEGNet optimization using lightweight Deep Neural Network for detecting human stress levels from Raw EEG signals dataset by Silabdi, Hana, Hassan, Raini, Faizabadi, Ahmed Rimaz, Gubbi, Abdullah, Bellary, Mohammed Zakir, Manjula, V

    Published 2025
    “…The results shows the effectiveness of model centric optimization in deep learning and open the door to the creation of more effective stress detection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Automated density and growth estimation in precision aquaculture systems for prawn cultivation using computer vision techniques by Chong, Xiao Wei

    Published 2024
    “…To address these challenges, this project proposes an innovative solution that leverages computer vision and machine learning techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Deep learning-based item classification for retail automation by Ling, Ji Xiang

    Published 2025
    “…By leveraging the Convolutional Neural Networks (CNNs) and computer vision techniques such as object detection and image segmentation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Characterizing Current Features of Malicious Threats on Websites by Wan Nurulsafawati, Wan Manan, Ahmed, Abdulghani Ali, M. N. M., Kahar

    Published 2019
    “…Attackers used a powerful technique, by embedding a malicious code in a normal webpage that resulted harder detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…Instead of get random value of position, ACO helps to optimize the nearest marble. Collision detection technique is one of a physic law that manipulate the movement and position of marble. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing phishing detection with advanced ensemble learning techniques by Nur Syakirin Mohd Shahiran, Mohammed Ahmed

    Published 2025
    “…This study showcases the potential of ensemble learning and feature optimization in enhancing phishing detection, offering a robust solution for practical cybersecurity applications.…”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Implementation of A.I. vehicle detection for traffic analysis using in-situ surveillance infrastructure by Saadullah Hyder, Marjan Gul, Sadiq Hussain, Syed Ilyas Ahmed, Aamir Nazeer, Faheem Ahmed

    Published 2023
    “…The technique used eliminates the video calibration, including distance and angle, required for detecting accurate speeds. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Optimal resource allocation for NOMA wireless networks by Albogamy, Fahad R., Aiyashi, M. A., Hashim, Fazirul Hisyam, Imran Khan, Choi, Bong Jun

    Published 2022
    “…The suggested algorithm’s most notable feature is that it converges to the global optimal solution. When compared to existing methods, simulation results reveal that the suggested technique has a better power allocation capability.…”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Object tracking using Particle Swarm Optimization for License Plate Detection by Nur Afrina Nasuha, Mohamed Izeham, Zalili, Musa, Nurul Izzatie Husna, Fauzi, Watada, Junzo

    Published 2026
    “…This study introduces a PSO-LPD approach, which uses Particle Swarm Optimization (PSO) for License Plate Detection for object tracking. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item