Search Results - (( using detection method algorithm ) OR ( binary classification methods algorithm ))
Search alternatives:
- classification methods »
- binary classification »
- methods algorithm »
- method algorithm »
- using detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
Segmentation of Lung Region in Computed Tomography (CT) Images
Published 2015“…The proposed method is uses Gaussian smoothing filter followed by thresholding to create binary mask for the lung region. …”
Get full text
Get full text
Final Year Project -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
4
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…This is done by using method of RF and RNN that share the same ensemble concept. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…In this paper, an improved method for intrusion detection for binary classification was presented and discussed in detail. …”
Get full text
Get full text
Get full text
Article -
6
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
7
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
8
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…This integration optimizes feature extraction by capturing both spatial and temporal relationships, enhancing the detection of complex network behaviors. Using the NSL-KDD dataset for evaluation, the proposed method demonstrates superior performance compared to conventional algorithms and related deep learning techniques, achieving higher precision, recall, F1 scores and overall accuracy in both binary and multi-class classification tasks. …”
Get full text
Get full text
Get full text
Thesis -
9
Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features
Published 2020“…The proposed method consists of five main stages, starting with eye area detection using the developed Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation
Published 2014“…This paper introduces a method to detect eye closure using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected component utilisation. …”
Get full text
Get full text
Conference or Workshop Item -
11
A COMBINED HISTOGRAM OF ORIENTED GRADIENTS AND COMPLETED LOCAL BINARY PATTERN METHODS FOR PEOPLE COUNTING IN A DENSE CROWD SCENARIO
Published 2016“…This method used a collaborative Histogram of Oriented Gradients (HOG) and Completed Local Binary Pattern (CLBP) based on people detection algorithm to detect headshoulder region. …”
Get full text
Get full text
Thesis -
12
Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq
Published 2024“…A Convolutional Neural Network (CNN) model was created from scratch for this study. Combining Local Binary Patterns (LBP) based texture features and deep learning features resulted in the creation of the fused features vector which was then optimized using Binary Dragonfly Algorithm (BDA) and Sine Cosine Algorithm (SCA). …”
Get full text
Get full text
Get full text
Thesis -
13
Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs
Published 2021“…Consequently, optimization algorithms including binary gravitation search algorithm (BGSA) and binary particle swarm optimization (BPSO), were employed to identify the optimal channels for gender classification. …”
Get full text
Get full text
Article -
14
Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani
Published 2005“…This project is all about implementing the back-propagation neural network algorithm in classification of face expression. This project has 3 objectives. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…This study investigates the performance of various conventional machine learning algorithms, including decision trees, naive Bayes, naive Bayes trees, random forest, random trees, MLP, and SVM, in detecting network intrusions using binary and multi-classification approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Global and local clustering soft assignment for intrusion detection system: a comparative study
Published 2017“…Clustering is unsupervised learning method that can be used for organizing data by grouping similar features into same group. …”
Get full text
Get full text
Get full text
Article -
19
Ultrasound-based tissue characterization and classification of fatty liver disease: A screening and diagnostic paradigm
Published 2015“…These classification algorithms are trained using the features extracted from the patient data in order for them to learn the relationship between the features and the end-result (FLD present or absent). …”
Get full text
Get full text
Get full text
Article -
20
Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System
Published 2008“…Also, the robust algorithm with hands of artificial immune system rules like binary hamming shape-space and advance detector structure with fast decision making to detect three abnormal behaviors such as entering the forbidden area, standing more than threshold and running was implemented The result obtained showed the improvement in the duration for each phase when compared with previous methods in image segmentation like mixture of Gaussian and behavior recognition like and/Or tree or neural networks.…”
Get full text
Get full text
Thesis
