Search Results - (( mobile detection method algorithm ) OR ( a selection based algorithm ))
Search alternatives:
- mobile detection »
- method algorithm »
- selection based »
- a selection »
-
1
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…In addition, the study suggests a promising potential of hybrid feature selection approach, diversity-based multiple classifier systems to improve mobile and wearable sensor-based human activity detection and health monitoring system. © 2019, The Author(s).…”
Get full text
Get full text
Article -
4
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
5
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Mental stress classification based on selected EEG channels using Correlation Coefficient of Hjorth Parameters
Published 2023“…This study introduces a novel channel selection method aimed at identifying highly accurate channels for detecting mental stress. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…Based on the analysis and optimization of the datasets, P300 signals are most clear and robust at the midline and parietal area of the scalp, and can be detected at around 500ms after a stimulus. …”
Get full text
Get full text
Thesis -
8
Improved Malware detection model with Apriori Association rule and particle swarm optimization
Published 2019“…In order to improve the detection rate of malicious application on the Android platform, a novel knowledge-based database discovery model that improves apriori association rule mining of a priori algorithm with Particle Swarm Optimization (PSO) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
A novel bio-inspired routing algorithm based on ACO for WSNs
Published 2019“…A novel approach of ant colony optimization (ACO) algorithm for discovering the optimum route for information transmission in the WSNs is proposed here for optimization and enhancement. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…Addressing these challenges entails an efficient and robust object detection and recognition algorithm. This algorithm can deal with a crowd of multiple faces via a mobile camera carried by a mini drone, and performs realtime video processing. …”
Get full text
Get full text
Get full text
Article -
11
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
12
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…As for the first component, a link layer mechanism with the notion of a selection algorithm based on weighted mean is primarily introduced for collecting link layer information and discovering the candidate access router. …”
Get full text
Get full text
Thesis -
13
A static analysis approach for android permission-based malware detection systems
Published 2021“…The results indicated that with a TPR value of 91.6%, the Random Forest algorithm achieved the highest level of accuracy in malware detection.…”
Get full text
Get full text
Get full text
Article -
14
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
Get full text
Get full text
Article -
15
Optimising acoustic features for source mobile device identification using spectral analysis techniques / Mehdi Jahanirad
Published 2016“…The proposed feature sets along with selected feature extraction methods from the literature are analyzed and compared by using supervised learning techniques (i.e. support vector machines, nearest-neighbor, naïve Bayesian, neural network, logistic regression, and ensemble trees classifier), as well as unsupervised learning techniques (i.e. probabilistic-based and nearest-neighbor-based algorithms). …”
Get full text
Get full text
Thesis -
16
Bacterial image analysis using multi-task deep learning approaches for clinical microscopy
Published 2024“…Methods Three object detection networks of DL algorithms, namely SSD-MobileNetV2, EfficientDet, and YOLOv4, were developed to automatically detect Escherichia coli (E. coli) bacteria from microscopic images. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. …”
Get full text
Get full text
Thesis -
18
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
Get full text
Get full text
Get full text
Article -
20
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article
