Search Results - (( usage detection based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- usage detection »
- detection based »
-
1
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
Get full text
Get full text
Final Year Project -
2
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Internet security requirements are increasing due to the growth of internet usage. One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). …”
Get full text
Get full text
Get full text
Article -
3
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
Get full text
Get full text
Article -
4
-
5
-
6
Panoramic image matching method for uav remote sensing based on surf algorithm
Published 2024text::Final Year Project -
7
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…This indicates that highest detection accuracy, high throughput performance and lowest detection time (i.e., fast detection) can effectively be achieved by RMD algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
9
Development Of Control Algorithm For Spot Cooling System
Published 2017“…This project’s aim is to develop a Control Algorithm for Spot Cooling system. The system helps to detect and track a non-human decoy. …”
Get full text
Get full text
Monograph -
10
Diabetic Retinopathy Detection Model using Hybrid of U-Net and Vision Transformer Algorithms
Published 2024“…We have evaluated our model on APTOS Blindness detection dataset in which our model outperforms traditional convolutional neural networks-based models. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
12
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
13
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
14
Machine learning-based anomaly detection in NFV: a comprehensive survey
Published 2023“…The research evaluates the strengths and weaknesses of various machine learningbased algorithms for detecting network-based anomalies in NFV networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
A wheelchair sitting posture detection system using pressure sensors
Published 2024“…A graphical-user interface (GUI) based application was developed using the algorithm with the highest accuracy, DT classifier, to illustrate the result of the posture classification to the wheelchair user for any posture correction to be made in case of improper sitting posture detected.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…This study proposed a Conditional Hybrid Intrusion Detection (CHID) by combining the flow-based with packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
18
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…The research concludes that the IoT-based AGV prototype is competent and reliable in handling the obstacle detection in fixed route with indoor environment workplace.…”
Get full text
Get full text
Get full text
Article -
19
Rule-base wearable embedded platform for seizure detection from real EEG data in ambulatory state
Published 2014“…This paper describes a classification method is presented using an empirical Rule-base System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. …”
Get full text
Get full text
Conference or Workshop Item -
20
