Search Results - (( java application using algorithm ) OR ( rate detection based algorithm ))
Search alternatives:
- java application »
- using algorithm »
- detection based »
- rate detection »
-
1
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
Machine learning algorithms in context of intrusion detection
Published 2016“…Although, signature based has high detection rate but it cannot detect novel attacks. …”
Get full text
Get full text
Conference or Workshop Item -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Experimental results show the proposed technique increases accuracy classification percentage up to 99.95%; and the minimum number of bins determine good discretization algorithm. Consequently, attack detection rate increases and false positive alarm rate minimizes. …”
Get full text
Get full text
Thesis -
6
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
8
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
9
-
10
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…To achieve that, an anthrax disease outbreak is chosen as a case study.Two artificial anthrax datasets known as WSARE7 and WSARE58 are taken as experiment data.The experiment is measured based on five metrics; detection rate, specificity, false alarm rate, accuracy, and time taken to produce result. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
13
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
14
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
15
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
Get full text
Get full text
Get full text
Article -
16
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…The utilization of cascade architecture to the extracted features, benefits the algorithm. The algorithms have been tested on simulated events, and the more suitable algorithm with high detection rate is expected to be presented in this paper.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus
Published 2018“…The performance of the algorithm has been evaluated of the heart rates tracing processed from the abdominal signals. …”
Get full text
Get full text
Get full text
Article -
19
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…This paper highlights a novel strategy for online Arabic text recognition using a hybrid Genetic Algorithm (GA) and Harmony Search algorithm (HS). The strategy is divided into two phases: text segmentation using dominant point detection, and recognition-based segmentation using GA and HS. …”
Get full text
Get full text
Article -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
Get full text
Get full text
Thesis
