Search Results - (( feature selection device algorithm ) OR ( java application using algorithm ))
Search alternatives:
- selection device »
- device algorithm »
- java application »
- using algorithm »
- feature »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
3
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. …”
Get full text
Get full text
Get full text
Article -
4
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…In this paper, we applied the bio-inspired algorithm as a feature optimization approach for selecting reliable permission features that able to identify malware attacks. …”
Get full text
Get full text
Article -
5
Empirical analysis of classifiers and feature selection techniques on mobile phone data activities
Published 2016“…To find the suitable combination between the classifier and the feature selection sometime is crucial. A series of tests conducted in Weka on the accuracy on feature selection shows a consistency on the results although with different order of features.The result found that combination of K* algorithm and correlation feature selection is the best combination with high accuracy rate and in the same time produce less feature subset.…”
Get full text
Get full text
Get full text
Article -
6
Intersection Features For Android Botnet Classification
Published 2019“…This paper proposed an enhancement approach for Android botnet classification based on features selection and classification algorithms. The proposed approach used requested permissions in the Android app and API function as features to differentiate between the Android botnet apps and benign apps. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
Hybrid intelligent approach for network intrusion detection
Published 2015“…The first one is about unifying the types and filtering the dataset by data transformation. Then, a features selection algorithm is applied to remove irrelevant and noisy features for the purpose of intrusion. …”
Get full text
Get full text
Get full text
Thesis -
10
Maldroid- attribute selection analysis for malware classification
Published 2019“…Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
Classification of hand gestures from EMG signals / Diaa Albitar
Published 2022“…Neighbourhood Component Analysis (NCA) are used as features selection technique has reduced the features to fourteen. …”
Get full text
Get full text
Thesis -
13
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
14
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
Published 2016“…Both models optimize acoustic features for source mobile device identification based on near-silent segments. …”
Get full text
Get full text
Thesis -
15
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
18
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
19
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
20
The classification of EEG signal processing using different machine learning techniques for BCI application
Published 2019“…Finally, the translation algorithm will be con-structed using selected and classified EEG features to control the BCI devices.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
