Search Results - adoption a difference ((extraction algorithm) OR (detection algorithm))
Search alternatives:
- extraction algorithm »
- a difference »
- adoption a »
-
1
-
2
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…While in testing the algorithm, it effectively detected multiple fault types, especially OCF and PS, with a perfect score and slightly lower yet high accuracies for GF. …”
Get full text
Get full text
Get full text
Article -
5
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article -
6
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…The spike encoding was used for feature extraction. The algorithm for this learning model adopted the reward-modulated STDP. …”
Get full text
Get full text
Monograph -
7
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
A Bayesian probability model for Android malware detection
Published 2021Get full text
Get full text
Get full text
Article -
10
Development of deep learning based user-friendly interface for fruit quality detection
Published 2024“…The implementation of deep learning algorithms has contributed to various applications related to the detection of fruit quality. …”
Get full text
Get full text
Get full text
Article -
11
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…The sequential multi-frames watermarking process could be speed up by two methods, first method was designed a speedy watermarking scheme algorithm (ROI-DR) in a single frame of medical image, and the second method was developed a new multi-frames watermarking scheme by adding parallelism component into sequential multi-frames watermarking process. …”
Get full text
Get full text
Thesis -
12
A Bayesian probability model for Android malware detection
Published 2022Get full text
Get full text
Get full text
Article -
13
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
14
SVM for network anomaly detection using ACO feature subset
Published 2016“…KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. …”
Get full text
Get full text
Conference or Workshop Item -
15
Weighting method for modal parameter based damage detection algorithms
Published 2011“…When researchers use bending modes for the purpose of damage detection, a number of available modes are adopted, each of which return a value indicating the severity of damage. …”
Get full text
Get full text
Article -
16
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
17
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…In the third algorithm, a soft assignment technique using fuzzy encoding is used to transform low-level features into a higher-level feature representation. …”
Get full text
Get full text
Thesis -
20
