Search Results - (( data detection method algorithm ) OR ( framework implementation using algorithm ))
Search alternatives:
- framework implementation »
- implementation using »
- method algorithm »
- using algorithm »
- data detection »
-
1
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
2
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
3
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Using a novel firewall framework designed in this dissertation, an algorithm adapted from research by Yan, Wu, Luo, & Zhang (2013) was used for the P2P identification method. …”
Get full text
Get full text
Thesis -
4
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
6
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. The enhancement of the proposed fast video processing method over existing methods in terms of computational complexity and accuracy is verified. …”
Get full text
Get full text
Get full text
Article -
7
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
8
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…The proposed CHA-IDS utilize best first and greedy stepwise with correlation-based feature selection to determine only significant features needed for the intrusion detection. These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. …”
Get full text
Get full text
Article -
9
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
Published 2019“…In addition, human activity detection methods have wide applications in security, surveillance and postural detection to prevent falls in elderly. …”
Get full text
Get full text
Get full text
Thesis -
10
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
11
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
12
Nonlinear vibration based modeling for damage detection of reinforced concrete beams / Muhammad Usman Hanif
Published 2018“…The nonlinear behavior, in the form of nonlinear vibration characteristics, was used in proposing a damage detection algorithm which doesn’t rely on the baseline data of the structure. …”
Get full text
Get full text
Get full text
Thesis -
13
Image Stitching Of Aerial Footage
Published 2021“…In this project, an image stitching framework is proposed to take aerial footage as input data. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
15
Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision
Published 2021“…These benefits however are challenged by the high computational requirements of the algorithms used. In this thesis, a framework is developed to enable the use of stereo vision in realtime teleoperation of a manipulator robot for the task of writing. …”
Get full text
Get full text
Thesis -
16
Efficient NASNetMobile-enhanced Vision Transformer for weakly supervised video anomaly detection
Published 2026“…Current video anomaly detection (VAD) methods struggle to prioritize informative frames and lack effective mechanisms to collect both local and global video contexts. …”
Get full text
Get full text
Article -
17
Rogue access point detector in UTAR campus
Published 2024“…In addition, this project introduces an intelligent algorithm for RAP detection and an additional isolation feature, if implemented, it is expected to safeguard the internal network of the institutions from unauthorised intruders to gain private insights of the network. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Augmented reality mapping with AR markers for enhanced tourism experiences
Published 2024“…The method approach to achieve this objective is using AR marker based and designed and developed using MATLAB. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
20
Development of brain tumor segmentation of magnetic resonance imaging (MRI) using u-net deep learning
Published 2023“…Numerous kinds of brain tumors were discovered, which need accurate and early detection techniques. Currently, most diagnosis and detection methods rely on the decision of neuro-specialists and radiologists to evaluate brain images, which may be timeconsuming and cause human errors. …”
Article
