Search Results - (((selection OR electronic) algorithm) OR (detection algorithm))
Search alternatives:
- selection »
- electronic »
-
1
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
2
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
3
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
5
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Using GSA, the parameter estimation of the classifier and the peak feature selection can be done simultaneously. Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
7
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…The Information Gain algorithm is used to select the most significant permissions, then the classification algorithms Naïve Bayes, Random Forest and J48 used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Article -
8
Extremal Region Selection for MSER Detection in Food Recognition
Published 2021“…Therefore, this research proposes an Extremal Region Selection (ERS) algorithm to improve MSER detection by reducing the number of irrelevant extremal regions by using unsupervised learning based on the k-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Evaluation of feature selection algorithm for android malware detection
Published 2018“…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Article -
10
Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan
Published 2017Subjects: Get full text
Get full text
Thesis -
11
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
12
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
14
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
Get full text
Get full text
Get full text
Article -
15
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
Published 2014“…number of algorithms have been recently proposed for automatic intruder detection from CCTV images. …”
Get full text
Get full text
Get full text
Article -
16
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. …”
Get full text
Get full text
Get full text
Article -
18
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
Published 2016“…By the combination of morphological approach to select the region of interest, the tracking algorithm delivers promising results as the tracking algorithm achieved 90% of ambulance detection at road intersections.…”
Get full text
Get full text
Thesis -
19
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…This technique is referred to as GABoost for this training part of a face detection system. The GA carries out an evolutionary search to select features which results in a higher number of feature types and sets selected in less time. …”
Get full text
Get full text
Get full text
Thesis -
20
A comparative study of pitch detection algorithms for microcontroller based voice pitch detector
Published 2017“…This paper presents a study to compare the performance of two pitch detection algorithms namely the Autocorrelation Function and the Cepstrum Analysis to select a suitable algorithm that can be developed into a standalone voice pitch detector. …”
Get full text
Get full text
Get full text
Article
