Search Results - (( sets detection method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- method algorithm »
- java application »
- using algorithm »
- sets detection »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…While numerous approaches for early detection continue to evolve, the quest for innovative methods remains constant. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
Model-based hybrid variational level set method applied to lung cancer detection
Published 2024“…This paper presents a novel model-based hybrid variational level set method (VLSM) tailored for lung cancer detection. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
10
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
11
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…The objectives of this study are to pre-process the scanned images and apply the image recognition algorithm for lane detection. The study employed Canny Edge Detection and Hough Transform algorithms on several sets of images. …”
Get full text
Get full text
Get full text
Article -
12
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The Naïve-Bayes classifier and the feature sub-set selection method were analyzed and tested on two sets of data. …”
Get full text
Get full text
Get full text
Article -
13
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…It sets a great benchmark for future work on driver drowsiness detection. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Such automated systems must rely on robust and effective algorithms for detection and prediction. Approach: The proposed detection system of epileptic seizure in EEG signals is based on Discrete Wavelet Transform (DWT) and Swarm Negative Selection (SNS) algorithm. …”
Get full text
Article -
15
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Detecting problematic vibration on unmanned aerial vehicles via genetic-algorithm methods
Published 2024“…The fitness function with the Genetic Algorithm (GA) optimization method is tested and evaluated based on Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE), and detection time. 51 sets of data have been collected using software in the loop (SITL) methods and are used to determine the effectiveness of the proposed fitness function and GA. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Get full text
Article -
18
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Implementation of the proposed method shows that it is robust and applicable for various kind of fruit images and is more accurate than the existing edge detection algorithms.…”
Get full text
Get full text
Get full text
Article -
20
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article
