Search Results - different detection algorithm
-
1
Evaluation of feature selection algorithm for android malware detection
Published 2018“…The comparison between existing TF-IDF algorithm and modified TF-IDF (MTF-IDF) algorithm have been tested in various conditions such as different number of sample, different number of feature and combination of different types of feature. …”
Get full text
Article -
2
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…Comparison between existing TF-IDF algorithm and MTF-IDF algorithm have been made under various conditions such as tested on different number of sample size, different number of features used and integration of different types of features. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
6
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
Get full text
Get full text
Thesis -
7
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014“…Besides that, a comparison is made with Cumulative Sum, Exponentially-weighted Moving Average, and Multi Layer Perceptron.From the experiment, the best parameter setting for anthrax outbreak using dendrite cell algorithm is identified whereby it proven can helps the model to produce a good detection result between detection rate and false alarm rate.Since each outbreak disease carries different outbreak characteristic, the parameter setting for different outbreak might be different.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An algorithm for Elliott Waves pattern detection
Published 2018“…Under several different algorithm settings, several EW pattern sets are obtained. …”
Get full text
Get full text
Article -
9
An algorithm for Elliott Waves pattern detection
Published 2018“…Under several different algorithm settings, several EW pattern sets are obtained. …”
Get full text
Get full text
Article -
10
Evaluation of fall detection classification approaches
Published 2012“…The acceleration data with a total data of 6962 instances and 29 attributes were used to evaluate the performance of the different classification algorithm. Results show that the Multilayer Perceptron algorithm is the best option among other mentioned algorithms, due to its high accuracy in fall detection.…”
Get full text
Get full text
Conference or Workshop Item -
11
Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm
Published 2019“…Other color model such as HSV and benchmarked algorithm are having slightly low detection rates due to some false face detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Driver drowsiness detection using different classification algorithms
Published 2020“…Hence, this paper present and prove the reliability of ECG signal for drowsiness detection in classifying high accuracy ECG data using different classification algorithms.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Final output of the algorithm summarise the bleeding detection for all patient in an excel file. …”
Get full text
Get full text
Thesis -
14
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
Published 2014“…In this paper, we propose Edge Adaptive Steganalysis algorithm based on histograms of the absolute difference of adjacent pixels to detect EALMR. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Machine learning algorithms in context of intrusion detection
Published 2016“…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
16
The noise reduction algorithm for star detection
Published 2025“…The results show that the proposed algorithm consistently detects all 20 target stars, achieving high detection accuracy even under severe noise conditions, outperforming conventional Laplacian of Gaussian (LoG) and Difference of Gaussian (DoG) approaches. …”
Get full text
Get full text
Get full text
Article -
17
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
18
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
19
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
20
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
Get full text
Get full text
Get full text
Article
