Search Results - (( using detection method algorithm ) OR ( software classification methods algorithm ))
Search alternatives:
- software classification »
- classification methods »
- methods algorithm »
- method algorithm »
- using detection »
-
1
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
2
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…Automatic diagnostic methods were frequently used to conduct breast cancer diagnoses in order to increase the accuracy and speed of detection. …”
Get full text
Get full text
Get full text
Article -
3
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
Published 2020“…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
Get full text
Get full text
Get full text
Article -
5
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
6
Classification and detection of intelligent house resident activities using multiagent
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
8
Autism Spectrum Disorder Classification Using Deep Learning
Published 2021“…Recently, deep learning methods have significantly sharpened the cutting edge of learning algorithms in a wide range of artificial intelligence tasks. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Development of Real-Time Eye Tracking Algorithm
Published 2021“…The eye tracking algorithm is implemented in OpenCV using Python Software for ease of portability. …”
Get full text
Get full text
Conference or Workshop Item -
10
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…Next, the neural network is retrained using these ideal values in order for the intrusion detection model to be able to recognize new attacks. …”
Get full text
Get full text
Get full text
Article -
11
Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm
Published 2019“…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
Get full text
Get full text
Thesis -
12
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The more the algorithm use in a project the better performance will be in result.…”
Get full text
Get full text
Thesis -
13
Lung cancer medical images classification using hybrid CNN-SVM
Published 2021“…Computer-Aided Detection (CAD) has been used to process CT images of the lung to determine whether an image has traces of cancer. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
15
Deep learning methods for facial expression recognition
Published 2019“…In this paper, we analyze various deep learning methods and their results. We have chosen Deep convolutional neural network as the best algorithms for facial expression detection and classification. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
-
18
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
Published 2016“…Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
Get full text
Get full text
Book Chapter -
19
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…This shows that the Negative Selection Algorithms are equipped with the capabilities of detecting changes in data, thus appropriate for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis
