Search Results - adoption _ differences ((selection algorithm) OR (detection algorithm))
Search alternatives:
- adoption »
- differences »
- selection »
-
1
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
2
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
Get full text
Get full text
Thesis -
3
SVM for network anomaly detection using ACO feature subset
Published 2016“…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
Get full text
Get full text
Conference or Workshop Item -
4
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing
Published 2019“…Comparative study has been done between different string distance measures and prioritization algorithms to select the best techniques for similarity-based test case prioritization. …”
Get full text
Get full text
Get full text
Article -
6
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…In a semiconductor industry, wafer defect detection has becoming ubiquitous. Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…The two sets of selected features are based on Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) approach respectively. …”
Get full text
Get full text
Article -
9
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…The differential evolution-based channel selection algorithm (DEFS_Ch) was computed to find the most suitable EEG channels that have the greatest efficacy for identifying the various emotional states of the brain regions. …”
Get full text
Get full text
Conference or Workshop Item -
11
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…In the training and testing of the models, the RF-CV algorithm with set combination of FE was employed to diagnose and classify different types of faults. …”
Get full text
Get full text
Get full text
Article -
12
Development of deep learning based user-friendly interface for fruit quality detection
Published 2024“…The implementation of deep learning algorithms has contributed to various applications related to the detection of fruit quality. …”
Get full text
Get full text
Get full text
Article -
13
A Bayesian probability model for Android malware detection
Published 2021“…The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
Get full text
Get full text
Get full text
Article -
14
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
Get full text
Get full text
Thesis -
15
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
16
A Bayesian probability model for Android malware detection
Published 2022“…The experiment was then conducted using two algorithms for feature selection: information gain and chi-square. …”
Get full text
Get full text
Get full text
Article -
17
-
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We also introduce a dynamic analysis method, AndroPsychology, in order to analyse the network communications of Android applications. We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The obtained result from the twelve deployed ML algorithms for the standalone intelligent ML-APS relay classifier modification without communication medium adoption for transmitting and receiving the updated relay operation settings during network configuration changes. …”
Get full text
Get full text
Thesis -
20
Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni
Published 2018“…The performance of the proposed sensory system was evaluated by checking the accuracy of the pattern recognition algorithm in detecting the gait phases at different speeds of normal walking. …”
Get full text
Get full text
Get full text
Thesis
