Search Results - (( knowledge detection using algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- knowledge detection »
- using algorithm »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Improving intrusion detection using genetic algorithm
Published 2013“…The validity of this approach is verified using Knowledge Discovery and Data Mining Cup 1999 (KDD Cup ’99) dataset. …”
Get full text
Get full text
Get full text
Article -
3
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
4
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
5
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. …”
Get full text
Get full text
Thesis -
7
Evaluation of fall detection classification approaches
Published 2012“…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
Get full text
Get full text
Conference or Workshop Item -
8
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005Get full text
Get full text
Conference or Workshop Item -
9
-
10
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
11
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…The WEKA (Waikato Environment for Knowledge Analysis) will be used for testing and generating the comparison output. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Feature selection algorithms for Malaysian dengue outbreak detection model
Published 2017“…Dengue fever is considered as one of the most common mosquito borne diseases worldwide. Dengue outbreak detection can be very useful in terms of practical efforts to overcome the rapid spread of the disease by providing the knowledge to predict the next outbreak occurrence. …”
Get full text
Get full text
Get full text
Article -
13
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm that uses fireflies’ behavior to interpret data. …”
Get full text
Get full text
Get full text
Article -
14
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
15
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
16
Early detection of dengue disease using extreme learning machine
Published 2018Get full text
Get full text
Article -
17
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…Channel pruning and layer pruning are applied to the sparse model, and post-processing methods using knowledge distillation are used to effectively reduce the model size and forward inference time while maintaining model accuracy. …”
Get full text
Get full text
Article -
18
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In this method, the candidate detectors generated by particle swarm optimization form rules using apriori association rule. These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
20
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis
