Search Results - made ((selection algorithm) OR (detection algorithm))
Search alternatives:
- selection »
-
1
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
2
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
Get full text
Get full text
Article -
4
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…This algorithm can detect weeds and also classify it. Currently the algorithm is tested on two types of weeds i.e. broad and narrow. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…A complexity comparison between two algorithms has been made in terms of number of mathematical operation. …”
Get full text
Get full text
Thesis -
6
Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System
Published 2010“…This paper deals with the Fault Detection and Diagnosis of steam boiler drum low level by artificial Neural Networks using two different interpretation algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…An improvement to the conventional DE algorithm has been made to change it from its classical form to be possibly applied for ambiguous targets range detection for radar system. …”
Get full text
Get full text
Thesis -
8
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis -
9
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
11
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Optimized intrusion detection mechanism using soft computing techniques
Published 2011“…So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. …”
Get full text
Get full text
Get full text
Article -
13
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
Get full text
Thesis -
14
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…In this thesis, local sensing results are produced by SUs or vehicles by selecting the best spectrum sensing technique. The selection would be made based on the hybrid machine learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Web Based Malicious URL Detection Through Feature Selection (Special Characters) with Machine Learning
Published 2023Get full text
Get full text
Undergraduates Project Papers -
16
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
17
Automated cone cut error detection of bitewing images using convolutional neural network
Published 2023“…The deep learning method selected was Convolutional Neural Network (CNN), and the algorithm was used and trained to classify the cone cut error. …”
Get full text
Get full text
Proceeding Paper -
18
Wet diaper detection and notification device to alert the baby caretaker
Published 2022“…The methods of this study were divided into four phases including project design, algorithm development, hardware development, and performance evaluation. …”
Get full text
Get full text
Get full text
Article -
19
Air quality measurement using remote sensing and digital images processing techniques / Lim, H. S. … [et al.]
Published 2004“…The algorithm used was based on the apparent reflectance values detected at near and far distances from the refence surface, and these in turn can be related to the concentration of the air pollutants. …”
Get full text
Get full text
Conference or Workshop Item -
20
