Search Results - "Awang, Suryanti"
-
1
An Enhanced Hybrid Feature Selection Technique Using Term Frequency-Inverse Document Frequency and Support Vector Machine-Recursive Feature Elimination for Sentiment Classification
Published in IEEE access (2021)“…Sentiment classification is increasingly used to automatically identify a positive or negative sentiment in a text review. In classification, feature selection…”
Get full text
Journal Article -
2
Malay sentiment analysis based on combined classification approaches and Senti-lexicon algorithm
Published in PloS one (23-04-2018)“…Sentiment analysis techniques are increasingly exploited to categorize the opinion text to one or more predefined sentiment classes for the creation and…”
Get full text
Journal Article -
3
A static analysis approach for Android permission-based malware detection systems
Published in PloS one (30-09-2021)“…The evolution of malware is causing mobile devices to crash with increasing frequency. Therefore, adequate security evaluations that detect Android malware are…”
Get full text
Journal Article -
4
A Sequential Handwriting Recognition Model Based on a Dynamically Configurable CRNN
Published in Sensors (Basel, Switzerland) (02-11-2021)“…Handwriting recognition refers to recognizing a handwritten input that includes character(s) or digit(s) based on an image. Because most applications of…”
Get full text
Journal Article -
5
The optimal scaling factor based on Secant Method for image watermarking using the hybrid DTCWT-DCT domain
Published in Iraqi Journal for Computer Science and Mathematics (06-02-2024)“…This paper proposes an implementation of the secant optimization method on the watermarkembedding in DTCWT domain. An objective function combining PSNR and NC…”
Get full text
Journal Article -
6
A Novel Statistical Feature Analysis-Based Global and Local Method for Face Recognition
Published in International journal of optics (2020)“…Face recognition from an image/video has been a fast-growing area in research community, and a sizeable number of face recognition techniques based on texture…”
Get full text
Journal Article -
7
Word sense disambiguation using hybrid swarm intelligence approach
Published in PloS one (20-12-2018)“…Word sense disambiguation (WSD) is the process of identifying an appropriate sense for an ambiguous word. With the complexity of human languages in which a…”
Get full text
Journal Article -
8
Vehicle Type Classification Using an Enhanced Sparse-Filtered Convolutional Neural Network With Layer-Skipping Strategy
Published in IEEE access (2020)“…In this paper, a vehicle type classification approach is proposed by using an enhanced feature extraction technique based on Sparse-Filtered Convolutional…”
Get full text
Journal Article -
9
Keyphrases Frequency Analysis From Research Articles: A Region-Based Unsupervised Novel Approach
Published in IEEE access (2022)“…Due to the advancement of technology and the exponential proliferation of digital sources and textual data, the extraction of high-quality keyphrases and the…”
Get full text
Journal Article -
10
Super-Low Resolution Face Recognition using Integrated Efficient Sub-Pixel Convolutional Neural Network (ESPCN) and Convolutional Neural Network (CNN)
Published in 2019 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS) (01-06-2019)“…Several deep image-based models which depend on deep learning have shown great success in the recorded computational and reconstruction efficiencies,…”
Get full text
Conference Proceeding -
11
Robust blind image watermarking scheme using a modified embedding process based on differential method in DTCWT-DCT
Published in Multimedia tools and applications (31-01-2024)“…This research paper presents a modified blind and robust image watermarking scheme that combines dual-tree complex wavelet transform (DTCWT) and discrete…”
Get full text
Journal Article -
12
Robust blind watermarking approach against the compression for fingerprint image using 2D-DCT
Published in Multimedia tools and applications (01-06-2022)“…This article presents a recent blind and robust fingerprint image watermarking scheme based on a two-dimensional discrete cosine transform (2D-DCT). The main…”
Get full text
Journal Article -
13
Android mobile malware detection using fuzzy AHP
Published in Journal of information security and applications (01-09-2021)“…Android mobile is very challenging because it is an open-source operating system that is also vulnerable to attacks. Previous studies have shown various mobile…”
Get full text
Journal Article -
14
Benign and Malignant Detection and Classification for Small Size Image of Breast Tumor Recognition System using U-Net Model
Published in 2024 5th International Conference on Artificial Intelligence and Data Sciences (AiDAS) (03-09-2024)“…Breast tumor recognition is a critical task in the field of medical imaging systems, aiming to differentiate between benign and malignant tumors. To…”
Get full text
Conference Proceeding -
15
Performance Evaluation of Hybrid Feature Selection Technique for Sentiment Classification based on Food Reviews
Published in 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM) (01-08-2021)“…This paper presents an evaluation of the performance efficiency of sentiment classification using a hybrid feature selection technique. This technique is able…”
Get full text
Conference Proceeding -
16
Performance Evaluation between RGB and YCrCb in TC-SF-CNNLS for Vehicle Type Recognition System
Published in 2021 IEEE 8th International Conference on Industrial Engineering and Applications (ICIEA) (23-04-2021)“…In this paper, the performance impact of vehicle type recognition (VTR) using Three-Channel of Sparse-Filtered Convolutional Neural Network with Layer-Skipping…”
Get full text
Conference Proceeding -
17
Suspicious Activity Trigger System using YOLOv6 Convolutional Neural Network
Published in 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) (20-02-2023)“…Property theft is one of the crimes that increases in which leads to a major concern in Malaysia. Despite of having surveillance cameras (CCTV) everywhere, the…”
Get full text
Conference Proceeding -
18
Region-Based Distance Analysis of Keyphrases: A New Unsupervised Method for Extracting Keyphrases Feature from Articles
Published in 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM) (01-08-2021)“…Due to the exponential growth of information's and web sources, Automatic keyphrase extraction is still a challenging issue in the current research area…”
Get full text
Conference Proceeding -
19
Road Enforcement Monitoring System based on Vehicle Type Recognition using Sparse Filtering Convolutional Neural Network with Layer Skipping Strategy (SFCNNLS)
Published in 2019 IEEE 6th International Conference on Industrial Engineering and Applications (ICIEA) (01-04-2019)“…Road Enforcement Monitoring System (REMS) is one of the traffic monitoring systems to monitor the enforcement of a specific route for public transportation in…”
Get full text
Conference Proceeding -
20
A Review: Static Analysis of Android Malware and Detection Technique
Published in 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM) (01-08-2021)“…Android malware has become more widespread in recent years due to the growing popularity of Android mobile. Android malware is installed without the user's…”
Get full text
Conference Proceeding