Search Results - (( java implication _ algorithm ) OR ( network ((detection using) OR (solution using)) algorithm ))
Search alternatives:
- java implication »
- solution using »
-
1
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…A proposed model has been practically used to the problem of intrusion detection as well as been validated using the NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Article -
3
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
4
Improving intrusion detection using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one of the key security components in today’s networking environment. …”
Get full text
Get full text
Get full text
Article -
5
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The ability of detecting P2P host by this algorithm was compared to the detection rate of operational DPI appliances in the network. …”
Get full text
Get full text
Thesis -
6
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The former suffers from partially or fully outdated knowledge after drift occurrence, and the latter suffers from the constraints of the pre-defined hyper-parameter of the model. Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). …”
Get full text
Get full text
Thesis -
7
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Conference Paper -
8
-
9
-
10
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
11
Oil spill detection and characterization from satellite image using artificial neural network algorithm
Published 2014“…This paper describes the use of artificial neural network to identify and characterize oil spill acquired from satellite imagery. …”
Get full text
Get full text
Conference or Workshop Item -
12
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
Published 2019“…The current work proposes a technique to detect Botnet attacks using a feed-forward backpropagation artificial neural network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
14
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article -
15
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…One of the key essential elements is the privacy of data sets; they can be turned publicly available and has potential to be use for the development of security solutions. …”
Get full text
Get full text
Thesis -
16
Neural network algorithm-based fall detection modelling
Published 2020“…This article presents results of modelling for fall detection system by using nonlinear autoregression neural network NARnet algorithm. …”
Get full text
Get full text
Get full text
Article -
17
An Improved Ensemble Deep Learning Model Based on CNN for Malicious Website Detection
Published 2023Conference Paper -
18
A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network
Published 2021“…A network intrusion detection system (NIDS) can act as one of the efficient security solutions by constantly monitoring the network traffic to secure the entry points of a network. …”
Get full text
Get full text
Get full text
Article -
19
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
20
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis
