Search Results - (( java implication based algorithm ) OR ( data detection device algorithm ))
Search alternatives:
- implication based »
- java implication »
- device algorithm »
- data detection »
-
1
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…An intelligent novel model comprising Random Forest Classifier with Independent Component Analysis (ICA) was proposed for botnet detection in IoT devices. Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
Get full text
Get full text
Article -
2
-
3
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Hence, it is critical for an anomaly detection algorithm to detect data anomalies patterns. …”
Get full text
Get full text
Thesis -
4
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
7
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
8
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
9
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…However, critical reviews have identified that the existing approaches are inefficient in processing data to detect anomalies due to the amassment of massive volumes of data through the connected devices. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Preliminary analysis of malware detection in opcode sequences within IoT environment
Published 2020“…This paper attempts to provide a preliminary analysis for malware detection within data generated by IoT-based devices and services in the form of operational codes (Opcode) sequences. …”
Get full text
Get full text
Get full text
Article -
13
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
14
Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data
Published 2014“…In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…The malware has potential to compromise and steal the private data, classified data, instant messages, private business contacts, and confidential schedule. …”
Get full text
Get full text
Get full text
Article -
17
Real-Time Object Detection System for Hospital Assets Using YOLOv8
Published 2024“…On the other hand, many hospitals face problems such as data entry errors. Based on this problem, the author hopes to solve it by implementing real-time object detection and recording data distribution using the YOLO (You Only Look Once) algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Embedded Fuzzy Classifier for Detection and Classification of Preseizure state using Real EEG data
Published 2014“…In order to make all this in a ubiquitous form factor, the algorithm for classification and detection of the pre-seizure conditions should be tremendously simple for processing the signal in a low cost ubiquitous microcontroller. …”
Get full text
Get full text
Book Section -
19
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…Based on evaluation that have done, we found that Farthest First is the best algorithm for 1000 (small data) and 10000 (bigger data). …”
Get full text
Get full text
Conference or Workshop Item -
20
