Search Results - (( java implication based algorithm ) OR ( based detection _ algorithm ))
Search alternatives:
- implication based »
- java implication »
- based detection »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
2
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
3
Machine learning algorithms in context of intrusion detection
Published 2016“…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
4
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
5
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
Get full text
Get full text
Thesis -
6
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. …”
Get full text
Get full text
Get full text
Article -
7
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…This algorithm is based on two detection schemes; namely active and passive. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
11
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
12
Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework
Published 2019“…The proposed framework utilizes the Cross-Time approach for enhancing temporal community detection algorithm. The expected result shows that the Enhanced Temporal Community Detection Algorithm based on Cross Time approach for higher visibility in supply chain network is the major finding when implementing this proposed framework. …”
Get full text
Get full text
Get full text
Article -
13
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
Published 2014“…In this paper, we propose Edge Adaptive Steganalysis algorithm based on histograms of the absolute difference of adjacent pixels to detect EALMR. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Fire Detection Algorithm using Image Processing Techniques
Published 2015“…Due to this the need for application for fire detection has increases in recent years. In this paper we proposed a fire detection algorithm based on image processing techniques which is compatible in surveillance devices like CCTV, wireless camera to UAVs. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. …”
Get full text
Get full text
Get full text
Article -
16
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
17
A review of object detection in traffic scenes based on deep learning
Published 2024“…It introduces techniques for optimizing object detection algorithms, summarizes commonly used object detection datasets and traffic scene datasets, along with evaluation criteria, and performs comparative analysis of the performance of deep learning algorithms. …”
Get full text
Get full text
Get full text
Article -
18
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Shot boundary detection based on orthogonal polynomial
Published 2019“…Finally, the support vector machine is utilized to detect hard transitions. In addition, a comparison between the proposed algorithm and other state-of-the-art algorithms is performed to reinforce the capability of the proposed work. …”
Get full text
Get full text
Get full text
Article
