Search Results - (( basic effective detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- effective detection »
- implication based »
- java implication »
-
1
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
2
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…Our aim is to demonstrate the effectiveness of proposed algorithms with the similarity distances in detecting the outliers. …”
Get full text
Get full text
Get full text
Article -
3
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
-
6
Particle Swarm Optimization algorithm for facial emotion detection
Published 2010Get full text
Working Paper -
7
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…Hybrid model's approaches have been widely used to increase the effectiveness of intrusion-detection platforms. This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
10
Segmentation of Malay syllables in connected digit speech using statistical approach
Published 2008“…Segmentation was done in time domain signal using statistical approaches namely the Brandt’s Generalized Likelihood Ratio (GLR) algorithm and Divergence algorithm. These approaches basically detect abrupt changes of energy signal in order to determine the segmentation points. …”
Get full text
Get full text
Get full text
Article -
11
Facial emotion detection using Guided Particle Swarm Optimization (GPSO)
Published 2009Get full text
Working Paper -
12
An automatic visual inspection of oil tanks exterior surface using unmanned aerial vehicle with image processing and cascading fuzzy logic algorithms
Published 2023“…The study focuses on two basic aspects of oil tank inspection through the images captured by the UAV, namely, the detection of defects and the distinction between defects and noise. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…An approach that detects steady state value for calling genetic algorithm (GA) is proposed to overcome the problems of good classifiers deletion and the local minima trap. …”
Get full text
Get full text
Thesis -
14
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
Get full text
Get full text
Thesis -
15
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Early detection of spots high water saturation for landslide prediction using thermal imaging analysis
“…Hence, to solve this issue, this study investigates a new method to detect water saturation spots which is integrated with a thermal image camera to provide early detection of landslide. …”
Get full text
Get full text
Research Report -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
Performance optimization method in OFDM based on majorization and minimization technique
Published 2019“…Another type of noise is known as Additive White Gaussian Noise (AWGN) or thermal noise whose effect is negligible comparing to phase noise. In this paper, we demonstrate and simulate a practical algorithm to mitigate phase noise which induces ICI .This algorithm is termed as Tight Quadratic Majorization (TQM) and is derived for phase noise estimation. …”
Get full text
Get full text
Get full text
Article -
20
Image Copy-Move Forgery Detection Algorithms Based on Spatial Feature Domain
Published 2023Conference Paper
