Search Results - (( _ application among algorithm ) OR ( its detection ((system algorithm) OR (based algorithm)) ))*
Search alternatives:
- application among »
- system algorithm »
- among algorithm »
- its detection »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
2
Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system
Published 2021“…However, the high computational power of PSO becomes a disadvantage in real-time and highly dynamic MPPT application. In addition, with the continuous improvement effort and the possibility of a new-comer algorithm can show superior results on the current problem, a new MFO based MPPT algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
-
4
Hybridization of metaheuristic algorithm in training radial basis function with dynamic decay adjustment for condition monitoring / Chong Hue Yee
Published 2023“…Artificial neural network (ANN) has shown effective in various condition monitoring and fault detection applications. ANN is popular due to its capability of identifying the complex nonlinear relationships among features in a large dataset and hence, it can perform with an accurate prediction. …”
Get full text
Get full text
Get full text
Thesis -
5
An Efficient Route Selection based on AODV Algorithm for VANET
Published 2016“…Accident detection systems are one of the most effective (ITS) tools. …”
Get full text
Get full text
Get full text
Article -
6
Identifying melanoma characteristics using directional imaging algorithm and convolutional neural network on dermoscopic images / Mohammad Asaduzzaman Rasel
Published 2024“…Advancements in digital dermoscopic image analysis have greatly improved computer-aided Melanoma diagnosis systems. The use of dermoscopic images early detection of Melanoma has gained popularity among researchers due to its non-invasive nature. …”
Get full text
Get full text
Get full text
Thesis -
7
Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection
Published 2023Conference Paper -
8
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Here, the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model. …”
Get full text
Get full text
Get full text
Article -
9
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
Published 2019“…On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks.…”
Get full text
Get full text
Monograph -
10
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
Get full text
Get full text
Monograph -
11
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In order to overcome this issue, machine vision embedded with deep learning algorithm can be implemented. Obstacle detection can be achieved through vision-based object detection, where the object classification model computes the images similarity to its respective classes, classifying its potential as an obstacle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
12
-
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
14
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
15
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
16
An FPGA based embedded vision system for real-time motion detection
Published 2015“…Due to its paramount importance for background subtraction algorithms to disregard unimportant movements such as camera jitter and tree branches, a multi model sigma delta algorithm was used. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
A review of YOLO algorithm and its applications in autonomous driving object detection
Published 2025“…This paper reviews the YOLO algorithm and its application in object detection in autonomous driving scenarios. …”
Get full text
Get full text
Get full text
Article -
18
Embedded system based driver drowsiness detection system
Published 2023“…This paper presents a System-on-Chip (SoC) visual-based driver drowsiness detection system. …”
Conference paper -
19
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
20
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article
