Search Results - (( sets detection system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- system algorithm »
- java application »
- using algorithm »
- sets detection »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…A robotic hardware system has been developed using LEGO Mindstorm kit. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…While numerous approaches for early detection continue to evolve, the quest for innovative methods remains constant. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The aim of the Intrusion Detection System (IDS) is to monitor the network system for any sort of attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Previous study by Leong show the useful of CAD system but her study is not fully automated. Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
-
11
Detection and extraction features for signatures images via different techniques
Published 2019“…In this paper, three widely used feature detection algorithms, SURF, BRISK and FAST, these algorithms are compared to calculate the processing time and accuracy for set of signatures correctly. …”
Get full text
Get full text
Conference or Workshop Item -
12
Obstacle Detection And Avoidance System
Published 2018“…The algorithm on how the robot car responses when obstacle is detected is also designed. …”
Get full text
Get full text
Monograph -
13
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Face detection using artificial neural network approach
Published 2007“…The system also applies the adaboost learning algorithm to select a small number of critical visual features from a very large set of potential features. …”
Get full text
Get full text
Article -
15
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
16
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…Experiments on a set of images from BioID face database proved that by using GA to search on a large number of feature types and sets, the proposed technique referred to as GABoost was able to obtain the cascades of boosted classifiers for the face detection system that can give higher detection rates (94.25%), lower false positive rates (55.94%) and less training time (6.68 hours).…”
Get full text
Get full text
Get full text
Thesis -
17
Evaluation of fall detection classification approaches
Published 2012“…An accurate automatic fall detection system can help elderly people be safe in every situation. …”
Get full text
Get full text
Conference or Workshop Item -
18
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
19
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. …”
Get full text
Get full text
Get full text
Article -
20
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
