Search Results - (( using normalization based algorithm ) OR ( basic detection method algorithm ))
Search alternatives:
- normalization based »
- method algorithm »
- basic detection »
-
1
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
2
Early detection of spots high water saturation for landslide prediction using thermal imaging analysis
“…The performance of these segmentation algorithms are measured using misclassification error. …”
Get full text
Get full text
Research Report -
3
Early detection of high water saturation spots for landslide prediction using thermal image analysis
Published 2018“…There are three segmentation algorithm used in this study which are HSV, K-Means and Feature Matching. …”
Get full text
Get full text
Thesis -
4
Mean of correlation method for optimization of affective states detection in children
Published 2018“…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Robust Kernel Density Function Estimation
Published 2010“…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
Get full text
Get full text
Thesis -
6
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
7
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
10
An ensemble feature selection method to detect web spam
Published 2018“…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
Get full text
Get full text
Get full text
Thesis -
12
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
14
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
16
-
17
Web Camera Application For Motion Detection
Published 2003“…The new method to detect motion is "vision motion detection". …”
Get full text
Get full text
Thesis -
18
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
19
Retrieval based on skin color to detect the malicious images
Published 2009Get full text
Get full text
Get full text
Research Report -
20
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper
