Search Results - (( features detection device algorithm ) OR ( java application using algorithm ))
Search alternatives:
- features detection »
- device algorithm »
- java application »
- using algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Article -
3
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…However due to the development of embedded hardware and object detection algorithm, current embedded device may be able to execute the object detection algorithm in real-time. …”
Get full text
Get full text
Conference or Workshop Item -
4
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…Moreover, the decision threshold value must be adaptive to the changes in the sEMG signal characteristics to reduce the number of false alarms that may arise with the fixed threshold and lead to unintended movements to these devices. In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
5
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…The algorithm does not employ any amplitude features in the detection process and employs only frequency features of the sEMG signal; therefore it is amplitude independent and can detect muscle activities in signals that have low signal to noise ratio. …”
Get full text
Get full text
Conference or Workshop Item -
6
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
Get full text
Get full text
Get full text
Article -
7
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…A static analysis technique with machine learning classifier is developed from the permission features noted in the Android mobile device for detecting the malware applications. …”
Get full text
Get full text
Article -
8
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…Moreover, the decision threshold value must be adaptive to the changes in the sEMG signal characteristics to reduce the number of false alarms that may arise with the fixed threshold and lead to unintended movements to these devices. In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
9
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…However, in machine learning intelligence detection, too many insignificant features will decrease the percentage of the detection’s accuracy. …”
Get full text
Get full text
Get full text
Article -
10
Hybrid intelligent approach for network intrusion detection
Published 2015“…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. …”
Get full text
Get full text
Get full text
Thesis -
11
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
12
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Moreover, log files have a lot of irrelevant and redundant features that act as noise. Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
13
An enhanced android botnet detection approach using feature refinement
Published 2019“…These features are able to disclose the sensitive information stored on the Android mobile devices. …”
Get full text
Get full text
Thesis -
14
-
15
Classification of hand gestures from EMG signals / Diaa Albitar
Published 2022“…Neighbourhood Component Analysis (NCA) are used as features selection technique has reduced the features to fourteen. …”
Get full text
Get full text
Thesis -
16
Data fusion and multiple classifier systems for human activity detection and health monitoring: Review and open research directions
Published 2019“…Recently, deep learning algorithms for automatic feature representation have also been proposed to lessen the burden of reliance on handcrafted features and to increase performance accuracy. …”
Get full text
Get full text
Article -
17
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Chi-square and information gain algorithms were used for features selection. The aim is to learn the behaviour of permission features that react to the accuracy according to the number of features. …”
Get full text
Get full text
Thesis -
18
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
19
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The massive volume of data with various dimensions and security features, on the other hand, can influence detection accuracy and raise the computation complexity of these systems. …”
Get full text
Get full text
Article -
20
Automated content sizing using accelerometer
Published 2014“…The purpose of this research is to study the technology of mobile accelerometer in mobile zooming feature. Accelerometer is a kind of device that built in mobile device in order to detect motion. …”
Get full text
Get full text
Undergraduates Project Papers
