Search Results - (( features detection method algorithm ) OR ( changes optimization sensor algorithm ))

Refine Results
  1. 1

    Face emotion recognition using artificial intelligence techniques by Kartigayan Muthukaruppan

    Published 2008
    “…The acquired images have gone through few preprocessing methods. The edge detection has to be successful even when the intensity of light is uneven. …”
    Get full text
    Thesis
  2. 2

    ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE by Saipullah, Khairul Muzzammil

    Published 2012
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone by Saipullah, Khairul Muzzammil

    Published 2013
    “…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Three algorithms were used to accomplish the task of feature representation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach by Kong, Zan Wai

    Published 2022
    “…However, there is no existing gateway placement scheme that considers all the factors of number of gateways, sensor nodes coverage, lateral bound (inter-gateway) connections, redundancy for fault tolerance and dynamic changes of sensor nodes’ location. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm by Zuwairie, Ibrahim, Mohd Zaidi, Mohd Tumari, Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Mohd Ibrahim, Shapiai

    Published 2014
    “…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
    Get full text
    Get full text
    Article
  11. 11

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item