Search Results - (( using modification detection algorithm ) OR ( java _ normalization algorithm ))
Search alternatives:
- normalization algorithm »
- modification detection »
- using modification »
-
1
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
2
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…However, most of them are complicated and unappealing to users with no mathematical background. The clustering algorithm from Sebert et al. (1998) is discussed and used since it is easy to understand with interesting proposed approach and have a good performance in detecting the presence of outliers. …”
Get full text
Get full text
Monograph -
3
-
4
Fetal R-Wave detection in the ambulatory monitoring of maternal abdominal signal
Published 1995“…These tags are then used as a basis for error correction and the measurement of the algorithm performance. …”
Get full text
Get full text
Article -
5
Development of photo forensics algorithm by detecting photoshop manipulation using error level analysis
Published 2017“…The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Monograph -
7
Forgery detection in medical images using Complex Valued Neural Network (CVNN)
Published 2011“…The performance of the algorithm has been evaluated using mammogram images. …”
Get full text
Get full text
Get full text
Article -
8
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…The Information Gain algorithm is used to select the most significant permissions, then the classification algorithms Naïve Bayes, Random Forest and J48 used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Article -
9
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
Get full text
Get full text
Conference or Workshop Item -
10
Improved Switching-Basedmedian Filter For Impulse Noise Removal
Published 2013“…Modifications towards a well known boundary discriminative detection (BDND) method have been made. …”
Get full text
Get full text
Thesis -
11
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
12
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Real-time system for facial emotion detection using GPSO algorithm
Published 2012Get full text
Working Paper -
15
Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A machine vision system is use in many applications such as parts sortation, defect detection, object recognition and parts counting. …”
Get full text
Get full text
Thesis -
16
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Facial emotion detection using GPSO and Lucas-Kanade algorithms
Published 2010Get full text
Working Paper -
20
Image authentication using Zernike moment watermarking
Published 2013“…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. Using two different watermarks lead to a good classification of incidental and malicious modifications and locating the tampered areas. …”
Get full text
Get full text
Thesis
