Search Results - (( java implication based algorithm ) OR ( using analysis detection algorithm ))
Search alternatives:
- analysis detection »
- implication based »
- java implication »
- using analysis »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
2
Evaluation of feature selection algorithm for android malware detection
Published 2018“…The analysis results show feature selection using MTF-IDF can improve malware detection analysis. …”
Get full text
Article -
3
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. To this end, this paper studies the classification analysis of intrusion detection using various supervised learning algorithms such as SVM, Naive Bayes, KNN, Random Forest, Logistic Regression and Decision tree on the NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Article -
4
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
Get full text
Get full text
Get full text
Article -
5
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…LPHA proves to be an efficient edge detector evaluation algorithm and FPSO is proven to be an effective edge detection algorithm.…”
Get full text
Get full text
Thesis -
6
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Furthermore, the taxonomy was used to evaluate the most recent machine learning algorithm and analysis. …”
Article -
7
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…The effect of video quality on human detection rate is discussed in Chapter 4. In a human detection, the software is represented by algorithms, in which algorithm also being used in the process of training the dataset. …”
Get full text
Get full text
Final Year Project -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
9
-
10
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…Machine learning is utilised for malware detection with the advancement of malware analysis. …”
Get full text
Get full text
Student Project -
11
-
12
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…In recent years, the worrying rate of street crime has demanded more reliable and efficient public surveillance system. Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…Then, the percentage of detection accuracy was used to compare the detection performance of all five algorithms. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Shot boundary detection based on orthogonal polynomial
Published 2019“…The outcomes of the comparative analysis show the superior performance of the proposed algorithm against other existing algorithms.…”
Get full text
Get full text
Get full text
Article -
16
Vision-based flame analysis using motion and Edge Detection
Published 2010Get full text
Get full text
Conference or Workshop Item -
17
-
18
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
Published 2003“…Through the proposed algorithm, various faults could be simulated and detected using the system. …”
Get full text
Get full text
Conference or Workshop Item -
19
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
20
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis
