Search Results - (( feature detection system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- feature detection »
- system algorithm »
- java application »
- using algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Evaluation of feature selection algorithm for android malware detection
Published 2018Get full text
Article -
5
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Feature selection and classifier parameter tuning are important factors that affect the performance of any intrusion detection system. …”
Get full text
Get full text
Get full text
Article -
6
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
7
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
SVM for network anomaly detection using ACO feature subset
Published 2016“…This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
9
Feature-based face recognition system using utilized artificial neural network
Published 2010“…Then, the proposed features cropping system will crop the detected iris and mouth automatically. …”
Get full text
Thesis -
10
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
12
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
13
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
14
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
16
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…This technique is referred to as GABoost for this training part of a face detection system. The GA carries out an evolutionary search to select features which results in a higher number of feature types and sets selected in less time. …”
Get full text
Get full text
Get full text
Thesis -
17
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The performance of the developed system has been compared with the existing intelligent skin detection systems. …”
Get full text
Get full text
Thesis -
20
