Search Results - (( features detection using algorithm ) OR ( data distribution function algorithm ))
Search alternatives:
- features detection »
- function algorithm »
- data distribution »
- using algorithm »
-
1
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
Published 2019“…In the first phase of HEFS, a novel Cumulative Distribution Function gradient (CDF-g) algorithm is exploited to produce primary feature subsets, which are then fed into a data perturbation ensemble to yield secondary feature subsets. …”
Get full text
Get full text
Get full text
Article -
2
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
3
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
Get full text
Get full text
Article -
4
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…In recent studies, the analysis of pressure transient signal can be seen as an accurate and low-cost method for the leak and feature detection in water distribution system. This paper applied Hilbert-Huang Transform (HHT) as a method to analyse the pressure transient signal. …”
Get full text
Get full text
Get full text
Article -
5
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The current research presents the implementation of an integrated kurtosisbased algorithm for a z-filter technique (Ikaz) to kurtosis ratio (Ikaz-kurtosis), for this allows automatic selection of the IMF that should be used. …”
Get full text
Get full text
Thesis -
6
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…We model the solution in the real setting of SDNs using High Level Petri Nets (HLPN), analyze the rules with Z language, and formally verified the correct functioning using Z3 SMT solver. …”
Get full text
Get full text
Thesis -
7
Evaluation of feature selection algorithm for android malware detection
Published 2018“…The Android features were filtered before detection process using TF-IDF algorithm. …”
Get full text
Article -
8
Pipe Leak Diagnostic Using High Frequency Piezoelectric Pressure Sensor And Automatic Selection Of Intrinsic Mode Function
Published 2017“…This paper reveals that utilizing the application of an integrated kurtosis-based algorithm for a z-filter technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) allows/contributes to/leads to automatic selection of the IMF that should be used. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The performance of different mechanisms utilized to perform the anomaly detection depends heavily on the group of features used. …”
Get full text
Get full text
Thesis -
10
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Detection and extraction features for signatures images via different techniques
Published 2019“…Three techniques have been applied using (UTSig) dataset; the results showed that the BRISK algorithm got the best result among the feature detection algorithm in terms of accuracy and the FAST algorithm got the best result among the feature detection algorithm in terms of run time.…”
Get full text
Get full text
Conference or Workshop Item -
12
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…The quantitative results show that the ORB and SURF algorithms detect and match more features than other algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
16
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
Get full text
Get full text
Thesis -
18
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
Get full text
Get full text
Thesis -
19
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…With these new feature types and larger search space, Genetic Algorithm (GA) is used within the Adaboost framework, to find sets of features which can provide a better cascade of boosted classifiers with a shorter training time. …”
Get full text
Get full text
Get full text
Thesis -
20
Feature-based face recognition system using utilized artificial neural network
Published 2010“…The main contributions of this project are the automatic algorithms for mouth detection, facial features cropping and face classification. …”
Get full text
Thesis
