Search Results - (( java implication based algorithm ) OR ( model detection technique algorithm ))
Search alternatives:
- implication based »
- java implication »
- model detection »
-
1
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The comparison of malware detection model utilising supervised machine learning techniques is the main goal of this project. …”
Get full text
Get full text
Student Project -
2
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
3
Fire Detection Algorithm using Image Processing Techniques
Published 2015“…The algorithm uses RGB colour model to detect the colour of the fire which is mainly comprehended by the intensity of the component R which is red colour. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…One of the most persistent challenges concerning network security is to build a model capable of detecting intrusions in network systems. …”
Get full text
Get full text
Get full text
Article -
5
Machine learning algorithms in context of intrusion detection
Published 2016“…These machine learning algorithms develop a detection model in a training phase. …”
Get full text
Get full text
Conference or Workshop Item -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
9
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
10
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
11
Continuous collision detection for virtual environments: A walkthrough of techniques
Published 2011“…Performing a computationally intensive technique for detecting between two configurations that focuses on accuracy always slows detection as compared to discrete collision detection (DCD). …”
Get full text
Get full text
Get full text
Article -
12
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…In addition, the wipe and dissolve transitions are detected using the change-point detection technique, SVM model, and scale invariant feature transform (SIFT). …”
Get full text
Get full text
Get full text
Thesis -
13
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…Based on the selected features, three predictive modeling techniques (J48, DTNB and Naive Bayes) were applied for dengue outbreak detection. …”
Get full text
Get full text
Get full text
Article -
14
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…This research focuses on the parameter estimation, outlier detection and imputation of missing values in a linear functional relationship model (LFRM). …”
Get full text
Get full text
Get full text
Thesis -
16
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
17
COMPUTERIZED SEGMENTATION OF SINUS IMAGES
Published 2009“…Multilevel thresholding algorithms were developed to segment the images into meaningful regions for the detection of sinusitis. …”
Get full text
Get full text
Final Year Project -
18
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
19
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
20
Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo
Published 2014“…We evaluated the models generated from seven classification algorithms with two simple data balancing techniques. …”
Get full text
Get full text
Get full text
Article
