Search Results - (( its application _ algorithm ) OR ( rate detection based algorithm ))
Search alternatives:
- its application »
- detection based »
- rate detection »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
4
An FPGA based embedded vision system for real-time motion detection
Published 2015“…This paper proposes an efficient FPGA (Field Programmable Gate Array) based real time video processing platform for monocular object detection. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Development of an efficient algorithm for fetal heart rate detection: a hardware approach
Published 2006“…The algorithm is based on cross-correlation, adaptive thresholding and statistical properties in the time domain. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
Get full text
Get full text
Thesis -
7
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
8
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…On the other hand, the detection algorithm based on the energy consumption achieves PDR of 91.6%, EED of 14.03 ms and detection rate accuracy of 93%. …”
Get full text
Get full text
Get full text
Thesis -
10
Enhanced computational methods for detection and interpretation of heart disease based on ensemble learning and autoencoder framework / Abdallah Osama Hamdan Abdellatif
Published 2024“…Heart disease remains the primary cause of mortality globally, and its early detection is critical for reducing mortality rates. …”
Get full text
Get full text
Get full text
Thesis -
11
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…From the experiments towards 12 benchmark and two outbreak datasets, the improved DCA is proven to have a better detection result than its previous version in terms of sensitivity, specificity, false detection rate and accuracy.…”
Get full text
Get full text
Article -
12
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
13
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…For most face recognition algorithms, partial occlusions affect the performance of the algorithm. …”
Get full text
Get full text
Thesis -
14
An adaptive anomaly threshold in artificial dendrite cell algorithm
Published 2017“…The dendrite cell algorithm (DCA) relies on the multi-context antigen value (MCAV) to determine the abnormality of a record by comparing it with anomaly threshold.In practice, the threshold is pre-determined before mining based on previous information and the existing MCAV is inefficient when expose to extreme values.This causes the DCA fails to detect unlabeled data if the new pattern distinct from previous information and reduces the detection accuracy.This paper proposed an adaptive anomaly threshold for DCA using the statistical cumulative sum (CUSUM) with the aim to improve its detection capability.In the proposed approach, the MCAV were normalized with upper CUSUM and the new anomaly threshold was calculated during run time by considering the acceptance value and min MCAV.From the experiments towards 12 datasets, the new version of DCA generated a better detection result than its previous version in term of sensitivity, specificity, false detection rate, and accuracy.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Process monitoring and fault detection in nonlinear chemical process based on multi-scale Kernel Fisher discriminant analysis
Published 2015“…A monitoring statistic based on Hoteling’s T2 statistics is used in process monitoring and fault detection. …”
Get full text
Get full text
Conference or Workshop Item -
16
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
17
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…This research investigates the use of a promising technique from machine learning to designing the most suitable intrusion detection for this challenging network type. The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
18
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…This work is inspired by Perceptually Important Points (PIP) data reduction algorithm due to its superior data reduction ability. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
20
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…The goodness of this ordering is measured using Average Percentage of rate of Faults Detection (APFD) metric to evaluate the effectiveness and efficiency of the approach. …”
Get full text
Get full text
Get full text
Article
