Search Results - (( developing organization detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing organization »
- organization detection »
- implication based »
- java implication »
-
1
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Boyer - Moore algorithm was claimed to be the fastest algorithm among the others. …”
Get full text
Get full text
Research Reports -
2
-
3
-
4
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Development of land target following system of hexacopter
Published 2015Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
7
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
9
Web application vulnerabilities detection model
Published 2016“…By compromising with these web application vulnerabilities, the system cracker can gain information about the user and lead to the reputation of the respective organization. This research aim to solve these issues by developing a detection model for detecting and recognizing the web vulnerabilities based on the defined and identified criteria. …”
Get full text
Get full text
Research Reports -
10
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…This work focuses on the FS problem by automatically detecting events through a novel wrapper FS method based on Adapted Binary Bat Algorithm (ABBA) and Adapted Markov Clustering Algorithm (AMCL), termed ABBA-AMCL. …”
Get full text
Get full text
Thesis -
11
-
12
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
Get full text
Get full text
Thesis -
13
Edge detection techniques for iris recognition system
Published 2013“…To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
16
Analysis Of Human Detection Method In Social Distancing Monitoring
Published 2022“…This study aims to analyze human detection using the deep learning method in various positions and to develop social distancing detection using the proposed method. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
18
Edge detection techniques for iris recognition system
Published 2013“…To develop an iris authentication algorithm for personal identification,this paper examines two edge detection techniques for iris recognition system. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
