Search Results - (( features detection method algorithm ) OR ( square optimization methods algorithm ))
Search alternatives:
- optimization methods »
- square optimization »
- features detection »
- methods algorithm »
- method algorithm »
-
1
Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance
Published 2025“…Recent studies have shown that this challenge can be addressed by employing machine learning algorithms for detection. Some studies have also implemented various feature selection methods to optimize detection efficiency. …”
Get full text
Get full text
Get full text
Article -
2
-
3
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…This method seeks to ensure secure and effective data concealment by identifying and utilizing noisy zones in images, making it more difficult for steganalysis tools to detect the embedded information. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Intelligent technique for grading tropical fruit using magnetic resonance imaging
Published 2013“…At hidden neuron value of 20, search is for backpropagation and number of neurons in the hidden layer to optimize the ANN. Levenberg-Marquardt algorithm (trainlm) gave the best performance fitness out of different types of backpropagation algorithm used with least Mean Square Error (MSE) of 0.0814 corresponding to R-value of 0.8094. …”
Get full text
Get full text
Get full text
Article -
5
Modeling, Testing and Experimental Validation of Laser Machining Micro Quality Response by Artificial Neural Network
Published 2009“…On the other hand, when we use computers to reduce uncertainty, the computer itself can become an expert in a specific field through a variety of methods. One such method is machine learning, which involves computer algorithm to capture hidden knowledge from data. …”
Get full text
Get full text
Article -
6
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
Get full text
Get full text
Get full text
Thesis -
7
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Conference or Workshop Item -
8
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…To address this problem, this research presents a fake news detection method that combines different features and developing methods for the most crucial phases in the detection process, including feature extraction, feature selection and fake news detection phases. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
10
Comparison of Feature Extractors for Real-Time Object Detection on Android Smartphone
Published 2013“…As we all know, object detection algorithm is a complicated algorithm that consumes high performance hardware to execute the algorithm in real time. …”
Get full text
Get full text
Article -
11
-
12
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
13
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…Based on the experimental results, the significant peak features of the peak detection algorithm were obtained where the average test accuracy is 77.74%.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Feature selection in intrusion detection, state of the art: A review
Published 2016“…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
Get full text
Get full text
Article -
15
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
17
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
18
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
19
TB-FusionNet: a multi-scale feature fusion algorithm with spatial and channel cross-attention for tuberculosis detection
Published 2026“…However, current multi-scale feature fusion methods still have several limitations. …”
Get full text
Get full text
Get full text
Article -
20
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article
