Search Results - (( features detection techniques algorithm ) OR ( java application using algorithm ))
Search alternatives:
- detection techniques »
- features detection »
- java application »
- using algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
3
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…Often some of these features are irrelevant and do not contribute directly to the face detection techniques. …”
Get full text
Get full text
Get full text
Thesis -
4
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
5
-
6
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…The algorithm does not employ any amplitude features in the detection process and employs only frequency features of the sEMG signal; therefore it is amplitude independent and can detect muscle activities in signals that have low signal to noise ratio. …”
Get full text
Get full text
Conference or Workshop Item -
7
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Further, the shortage of efficient feature selection techniques gives rise to low accuracy in anomaly detection. …”
Get full text
Get full text
Thesis -
9
SVM for network anomaly detection using ACO feature subset
Published 2016“…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
Get full text
Get full text
Conference or Workshop Item -
10
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…From the results, an accuracy of 99% is achieved using the voting ensemble technique with feature selection compared with 77.3% without feature selection. …”
Get full text
Get full text
Get full text
Article -
12
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…Based on the selected features, three predictive modeling techniques (J48, DTNB and Naive Bayes) were applied for dengue outbreak detection. …”
Get full text
Get full text
Get full text
Article -
13
-
14
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
15
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
Get full text
Get full text
Get full text
Article -
16
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The state-of-the-art shows that most of the feature reduction techniques, if not all, which have been implemented for the damage detection are feature selection not extraction. …”
Get full text
Get full text
Thesis -
17
BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning
Published 2023“…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
Article -
18
Feature-based face recognition system using utilized artificial neural network
Published 2010“…A proposed algorithm which combines RGB color map and corner detection techniques will detect the mouth corners. …”
Get full text
Thesis -
19
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…This technique shows that the use of Android permissions is a potential feature for malware detection. …”
Get full text
Get full text
Article -
20
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…ITLBO with supervised machine learning (ML) technique was used for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article
