Search Results - (( developing communities detection algorithm ) OR ( java binary classification algorithm ))
Search alternatives:
- developing communities »
- communities detection »
- binary classification »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Robust overlapping community detection in complex networks with graph convolutional networks and fuzzy C-means
Published 2024“…Community detection is an important task in complex network analysis. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent DNA signature detection for internet worms
Published 2011“…Internet scanning worms are widely regarded to be a major security threat faced by the Internet community today. Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
Get full text
Get full text
Get full text
Article -
5
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
Get full text
Get full text
Get full text
Article -
6
-
7
MelScan: An Android Application for Early Detection of Melanoma
Published 2014“…Amongst the medical community, more focus was given on early detection of cancer, in particular melanoma, a type of skin cancer. …”
Get full text
Get full text
Final Year Project -
8
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
9
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
10
Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga
Published 2022“…The use of gut microbiome in early detection of the disease has attracted much attention from the research community due to its non-invasive nature. …”
Get full text
Get full text
Get full text
Thesis -
11
Breast boundary segmentation in thermography images based on random walkers
Published 2017“…The detected areola region is then utilized for automatic seed placement for the random walker algorithm. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran
Published 2023“…It uses YOLOv5 object detection and classification algorithm. This project uses the images of paper, plastic and metal gathered from Kaggle and GitHub dataset. …”
Get full text
Get full text
Thesis -
14
-
15
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
Get full text
Get full text
Get full text
Article -
16
UTeM navigation system: pedestrian and traffic sign detection using CNN algorithm
Published 2022“…The system using algorithm using CNN as an algorithm and the architecture used is Tiny-YOLOv2 to detect traffic signs and pedestrians. …”
Get full text
Get full text
Get full text
Article -
17
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems (IDS). …”
Get full text
Get full text
Get full text
Article -
18
Benthic habitat mapping and coral bleaching detection using quickbird imagery and Kd algorithm
Published 2013“…Subsequently, the results were analyzed to assess the impacts of these fluctuations on main coral reef communities. Finally, as fourth objective of this thesis, the feasibility of using multi-temporal satellite images for detecting bleaching events was investigated. …”
Get full text
Get full text
Thesis -
19
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
Get full text
Get full text
Get full text
Article -
20
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
Get full text
Get full text
Article
