Search Results - adoption a different detection algorithm
Search alternatives:
- a different »
- adoption a »
-
1
SVM for network anomaly detection using ACO feature subset
Published 2016“…KDD99, which is a benchmark dataset used for anomaly detection, has been adopted here. …”
Get full text
Get full text
Conference or Workshop Item -
2
Weighting method for modal parameter based damage detection algorithms
Published 2011“…When researchers use bending modes for the purpose of damage detection, a number of available modes are adopted, each of which return a value indicating the severity of damage. …”
Get full text
Get full text
Article -
3
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
4
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
5
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…In the third algorithm, a soft assignment technique using fuzzy encoding is used to transform low-level features into a higher-level feature representation. …”
Get full text
Get full text
Thesis -
6
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Multisensor Data Fusion Algorithm for Contactless 3D Position Measurement for Post-Stroke Hand Rehabilitation
Published 2018“…The presence of the exercise ball in the hand adds a degree of difficulty to the problem when an optical solution is adopted. …”
Get full text
Get full text
Monograph -
10
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…This paper presents a classification of android malware using candidate detectors generated from an unsupervised association rule of Apriori algorithm improved with particle swarm optimization to train three different supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
13
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…The parameters of the Jang algorithm and TransGuide algorithm were sensitive for different days. …”
Get full text
Get full text
Get full text
Thesis -
14
Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing
Published 2019“…Identified enhancements have been implemented to both techniques for a better adoption of prioritizing SPL test cases. …”
Get full text
Get full text
Get full text
Article -
15
Performance evaluation of intrusion detection system using selected features and machine learning classifiers
Published 2021“…The results show that using optimal features coupling with a good classifier in a detection system able to reduce the classifier model building time, reduce the computational burden to analyze data, and consequently attain high detection rate.…”
Get full text
Get full text
Article -
16
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
17
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Development of deep learning based user-friendly interface for fruit quality detection
Published 2024“…The implementation of deep learning algorithms has contributed to various applications related to the detection of fruit quality. …”
Get full text
Get full text
Get full text
Article -
19
Comparative study of different binarization methods through their effects in characters localization in scene images
Published 2018“…Then we compare this binarization scheme with four famous different methods and explore their effects on detection characters in scene images. …”
Get full text
Get full text
Article -
20
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article
