Search Results - (( data detection techniques algorithm ) OR ( java optimization path algorithm ))
Search alternatives:
- detection techniques »
- java optimization »
- optimization path »
- data detection »
- path algorithm »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
2
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…This work uses iterative smoothing algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Thesis -
3
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…This work uses iterative boosting algorithm to find an alternative path with less distance and energy consumption. …”
Get full text
Get full text
Get full text
Article -
4
Visdom: Smart guide robot for visually impaired people
Published 2025“…Core functionalities such as path planning, autonomous movement, voice feedback, and app-to-robot communication have been thoroughly tested and optimized. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…There are various data mining tools available to analyze data related android malware detection. …”
Get full text
Get full text
Get full text
Article -
6
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
9
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
10
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
11
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
12
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
13
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
14
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
15
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Further, the shortage of efficient feature selection techniques gives rise to low accuracy in anomaly detection. …”
Get full text
Get full text
Thesis -
17
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…The traditional algorithms need data preparations while unsupervised algorithms can be prepared so that they can handle the data in war format. …”
Get full text
Get full text
Article -
18
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Later, this algorithm will be extended to optimize the model in detecting outlier on data streams. …”
Get full text
Get full text
Conference or Workshop Item -
19
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article -
20
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article
