Search Results - (( trained detection based algorithm ) OR ( java application using algorithm ))
Search alternatives:
- trained detection »
- java application »
- detection based »
- using algorithm »
-
1
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…While numerous approaches for early detection continue to evolve, the quest for innovative methods remains constant. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Neural network algorithm-based fall detection modelling
Published 2020“…The algorithm is trained by network training function; LM, SCG and RP by collocation with threshold-based setting value. …”
Get full text
Get full text
Get full text
Article -
3
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
4
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
5
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
6
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…Proposed real-time training dataset for SVM algorithm achieved highest detection rate of 99.13% while decision tree and Naïve Bayes has 93.28% & 86.41% of attack detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Overhead view based person counting using deep learning
Published 2022“…First, the YOLOv4 and YOLOv4-tiny object detection models are trained with the dataset of overhead camera perspective. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
Development of vehicle detection and counting system for traffic analysis using computer vision
Published 2024“…Once the trained weights are ready a deep learning algorithm detection model is applied to detect and draw a bounding box on the vehicles. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Machine learning algorithms in context of intrusion detection
Published 2016“…These machine learning algorithms develop a detection model in a training phase. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.]
Published 2023“…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
Get full text
Get full text
Article -
15
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
16
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…The size of the training sample is, however, found to be an important consideration - a model trained with only 30 s of CAN traffic always yields better detection performance than a model trained with a larger window of CAN traffic.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…The one hidden layer with one neuron using BFG training algorithm provides the best optimum neural network structure. …”
Get full text
Get full text
Get full text
Article -
18
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
19
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…Overall, our study emphasizes the importance of addressing data leakage in the training process to ensure the reliability of ML-based IDS models.…”
Get full text
Get full text
Article -
20
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…This is attributable to the increasing number of audit data features and the decreasing performance of human-based smart Intrusion Detection Systems (IDS) regarding classification accuracy and training time. …”
Get full text
Get full text
Get full text
Article
