Search Results - more ((selection algorithm) OR (detection algorithm))
Search alternatives:
- selection »
-
1
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…To achieve such goal, this research modifies and improves the Reduction with Selective Redundancy (RSR) algorithm. In the modify algorithm, test cases would be selected according to the branch coverage if they covered different branch combination. …”
Get full text
Get full text
Thesis -
3
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…The more error-free the data, the more efficient the clustering algorithm, as data errors cause data to be placed in incorrect groups. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
5
ABC: android botnet classification using feature selection and classification algorithms
Published 2017“…In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
Get full text
Get full text
Article -
6
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Some of the previous researchers used a feature set selection which is introduced for IDS but there still shortage in their detection rate and selected amounts of features. …”
Get full text
Get full text
Thesis -
9
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
10
Improved Ozone Level Detection through Feature Selection with Modified Whale Optimization Algorithm
Published 2024“…This study presents a new approach for ozone level detection through feature selection by the modified Whale Optimization Algorithm (mWOA). …”
Get full text
Get full text
Get full text
Article -
11
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
12
Fault detection with optimum March test algorithm
Published 2013“…The automation hardware was designed to give the flexibility to the user to generate other new March Algorithm prior to the selected algorithm and analyzed the performance in terms of fault detection and power consumption.…”
Get full text
Get full text
Get full text
Article -
13
Improved Ozone Level Detection through Feature Selection with Modified Whale Optimization Algorithm
Published 2024“…This study presents a new approach for ozone level detection through feature selection by the modified Whale Optimization Algorithm (mWOA). …”
Get full text
Get full text
Get full text
Article -
14
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
15
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…The benefit of this work indicated that the implementation of a feature selection technique plays an important role in machine learning algorithms to increase the performance of detection.…”
Get full text
Get full text
Thesis -
16
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
17
Bot detection using machine learning algorithms on social media platforms
Published 2021“…The components of the study are data, feature selection, and bot detection. The research performs web development and hosting on the collected data with a machine-learning algorithm to perform bot detection in social media networks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The Differential Evolution Algorithm (DE) is used in this work to select the optimum color and texture information to achieve the optimum response. …”
Get full text
Get full text
Thesis -
19
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
20
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis
