Search Results - ((((detection algorithm) OR (selection algorithm))) OR (conversion algorithm))
Search alternatives:
- conversion algorithm »
-
1
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The accuracy of the algorithm developed in detecting tumour is 94.38% showing that it is relevant for use by radiologists. …”
Get full text
Get full text
Monograph -
2
Human face detection using skin color segmentation and watershed algorithm
Published 2017“…Watershed algorithm is applied to isolate the facial feature from the background. …”
Get full text
Get full text
Article -
3
Evaluation of feature selection algorithm for android malware detection
Published 2018“…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Article -
4
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
Get full text
Get full text
Thesis -
5
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
6
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
8
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review
Published 2021“…Nevertheless, various concerns over the homogeneity of data based on patient selection, scanner effects, and the variable usage of classifiers and algorithms pose a challenge for ML-based image interpretation of rs-fMRI datasets to become a mainstream option for diagnosing AD and predicting the conversion of HC/MCI to AD.…”
Get full text
Get full text
Get full text
Article -
10
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
11
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
12
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…To achieve such goal, this research modifies and improves the Reduction with Selective Redundancy (RSR) algorithm. In the modify algorithm, test cases would be selected according to the branch coverage if they covered different branch combination. …”
Get full text
Get full text
Thesis -
13
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Using GSA, the parameter estimation of the classifier and the peak feature selection can be done simultaneously. Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
16
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
17
Extremal region selection for MSER detection in food recognition
Published 2021“…Therefore, this research proposes an Extremal Region Selection (ERS) algorithm to improve MSER detection by reducing the number of irrelevant extremal regions by using unsupervised learning based on the k-means algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
19
Extremal Region Selection for MSER Detection in Food Recognition
Published 2021“…Therefore, this research proposes an Extremal Region Selection (ERS) algorithm to improve MSER detection by reducing the number of irrelevant extremal regions by using unsupervised learning based on the k-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
Get full text
Get full text
Thesis
