Search Results - (( (evolution OR solution) feature detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- feature detection »
- implication based »
- java implication »
-
1
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…However, the MBGWO has several issues in finding a good quality solution. Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
2
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…Based on these feature extraction results, a system based on a combination of an MLP ANN and k-means clustering which employs the YIQ color space and the statistical features of human skin as inputs is developed for human skin detection. …”
Get full text
Get full text
Thesis -
3
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
Get full text
Get full text
Thesis -
4
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
5
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…This research utilises the web page phishing detection dataset, which consists of 11,430 URLs with 87 features. …”
Get full text
Get full text
Get full text
Article -
6
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
Get full text
Get full text
Conference or Workshop Item -
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
Get full text
Get full text
Thesis -
8
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Thus, a swarm-based hybrid approach is proposed for cancer classification with a new variant of the Firefly Algorithm (FA) and Correlation-based Feature Selection (CFS) filter. …”
Get full text
Get full text
Get full text
Article -
9
-
10
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
11
A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC
Published 2020“…Consequently, the comparative study shows the overall good performance of the system achieving 100% detection accuracy with features’ rich model and 90% detection accuracy with features’ poor model, indicating the viability of the proposed solution.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
Published 2024“…This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection algorithm designed to enhance model performance in machine learning applications. …”
Get full text
Get full text
Get full text
Article -
13
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. …”
Get full text
Get full text
Get full text
Article -
14
Intersection Features For Android Botnet Classification
Published 2019“…The results showed that Decision Tree with Chi-Square feature selection achieved the highest detection accuracy of 98.6% which was higher than other classifiers.…”
Get full text
Get full text
Get full text
Article -
15
A static analysis approach for android permission-based malware detection systems
Published 2021“…The goal of this research is to examine the effectiveness of static analysis to detect Android malware by using permission-based features. …”
Get full text
Get full text
Get full text
Article -
16
Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.]
Published 2025“…In this paper, three algorithms were developed: the first was for outlier removal from features, the second was for feature selection, and the third was for partial-features-availability-aware ML model selection. …”
Get full text
Get full text
Get full text
Article -
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Bot detection using machine learning algorithms on social media platforms
Published 2021“…Currently, there are several solutions for bots detection. However, the accuracy of the detection still needs improvement. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Maldroid- attribute selection analysis for malware classification
Published 2019“…Malware authors use android market as a hub for malicious apps and spread malware to users with the intention to threaten privacy; and this has remained undetected due to the weakness in signature-based detection. A major problem with malware detection is the existence of numerous features in malware code and the need to look at the relevant features in malware analysis. …”
Get full text
Get full text
Get full text
Article
