Search Results - (( _ application among algorithm ) OR ( rate detection system algorithm ))*
Search alternatives:
- application among »
- system algorithm »
- among algorithm »
- rate detection »
-
1
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Development Of Control Algorithm For Spot Cooling System
Published 2017“…This project’s aim is to develop a Control Algorithm for Spot Cooling system. The system helps to detect and track a non-human decoy. …”
Get full text
Get full text
Monograph -
3
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
4
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…The main goal is to increase the diagnostic accuracy rate. In this thesis we developed a computer aided system for the diagnosis and detection of breast cancer using curvelet transform. …”
Get full text
Get full text
Thesis -
5
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Using sample datasets, the EEG signal is analyzed to determine the most suitable scalp area for P300 detection, while optimization with genetic algorithm (GA) is developed to select best four channels. …”
Get full text
Get full text
Thesis -
6
Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection
Published 2023Conference Paper -
7
3D face registration across pose variation and facial expression using cross profile alignment
Published 2011“…The experiment conducted on challenging 3D face databases yields good results with 94.77% detection rate for the nose tip region detection algorithm. …”
Get full text
Get full text
Thesis -
8
Applying Neural Network to U2R Attacks
Published 2010“…The system uses sampled data from Kddcup99 dataset, an attack database that is a standard for evaluating the security detection mechanisms. …”
Get full text
Get full text
Conference or Workshop Item -
9
Performance Analysis Of Different Hash Functions Using Bloom Filter For Network Intrusion Detection Systems In 32-Bit And 64-Bit Computer Operation Mode.
Published 2016“…A Network Intrusion Detection System (NIDS) is an application or device that screens the network traffics for malicious activities or any violation in the network policy. …”
Get full text
Get full text
Thesis -
10
Tracking consistency metric for video surveillance tracking
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Lung nodule detection using multi-resolution analysis
Published 2013“…That results in a detection rate of 81.212%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Android Ransomware Detection Based on Dynamic Obtained Features
Published 2024journal::journal article -
13
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
Published 2019“…On comparing our results with the existing systems, it was found that the proposed algorithm performed better in the detection of malicious nodes, throughput, false positive rate and detection of attacks.…”
Get full text
Get full text
Monograph -
14
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…By virtue of the application of multi-level detection, the proposed system achieves more than 70% detection at the first level, which significantly increases to 100% detection at the second level. …”
Get full text
Get full text
Get full text
Article -
15
Enhanced android malware detection framework using API application framework layer
Published 2023“…Android is an open source mobile operating system which is gaining more popularity among users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB)
Published 2017“…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Development of eCall for Malaysia's automotive industries
Published 2019“…As such, collision detection and voice communication algorithm has been designed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Machine learning algorithms in context of intrusion detection
Published 2016“…The result shows that not a single algorithm has a high detection rate for each class of KDD99 dataset. …”
Get full text
Get full text
Conference or Workshop Item -
19
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
20
New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams
Published 2022“…Despite the effective proposed GMPPT algorithm, the PSCs reduce the maximum power extraction capability of the PV system heavily due to the activation of bypass diodes. …”
Get full text
Get full text
Get full text
Thesis
