Search Results - (( work detection based algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- java application »
- detection based »
- work detection »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
-
3
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Hence, a detailed flowchart of the working procedures of the project based on Canny edge detection algorithm is designed. …”
Get full text
Get full text
Final Year Project -
4
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
5
-
6
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
7
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
Get full text
Get full text
Thesis -
8
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
10
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The experiments were performed on the prominent intrusion machine-learning datasets (KDDCUP’99 and CICIDS 2017), where significant enhancements were observed with the suggested NTLBO algorithm as compared to the classical TeachingLearning-Based Optimization algorithm (TLBO), NTLBO presented better results than TLBO and many existing works. …”
Get full text
Get full text
Get full text
Article -
11
Observer-based fault detection with fuzzy variable gains and its application to industrial servo system
Published 2020“…The proposed fault detection algorithm employs a fuzzy logic-based approach with the objective of finding the appropriate observer gains that could cope with the different working conditions. …”
Get full text
Get full text
Get full text
Article -
12
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
13
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…Fortunately, Artificial Intelligence (AI) has recently attracted a lot of attention, and it is now a principal component of these systems. This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
Get full text
Get full text
Article -
15
Propose a new firefly-fast learning network model based intrusion-detection system
Published 2019“…However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a single algorithm. …”
Get full text
Get full text
Article -
16
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
17
Shot boundary detection based on orthogonal polynomial
Published 2019“…Finally, the support vector machine is utilized to detect hard transitions. In addition, a comparison between the proposed algorithm and other state-of-the-art algorithms is performed to reinforce the capability of the proposed work. …”
Get full text
Get full text
Get full text
Article -
18
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…The detection algorithm was developed analytically by applying the Signal Detection Theory (SDT) and the Random Matrix Theory (RMT). …”
Get full text
Get full text
Get full text
Thesis -
19
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The performance of the developed system has been compared with the existing intelligent skin detection systems. The experimental results reveal that the developed algorithm is able to achieve an accuracy of 87.82% F1-measure based on images from the ECU database. …”
Get full text
Get full text
Thesis -
20
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis
