Search Results - (( rate evaluation method algorithm ) OR ( features detection method algorithm ))
Search alternatives:
- features detection »
- method algorithm »
- rate evaluation »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
3
Epileptic Seizure Detection Using Singular Values And Classical Features Of EEG Signals
Published 2014“…This project aims at developing an automated epileptic seizure event detection algorithm. The proposed algorithm depends on using five features which are singular values, total power, delta band power, variance and mean. …”
Get full text
Get full text
Final Year Project -
4
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To provide compact feature vector representation, we studied hybrid bio-inspired evolutionary search algorithm and correlation-based feature selection method and evaluate their impact on extracted feature vectors from individual sensor modality. …”
Get full text
Get full text
Article -
5
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
6
Analysis of artificial neural network and viola-jones algorithm based moving object detection
Published 2014“…Analysis of moving object detection methods is presented in this paper, includes Artificial Neural Network (ANN) and Viola-Jones algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
8
Spectral texture segmentation of Magnetic Resonance Imaging (MRI) brain images for glioma brain tumour detection / Rosniza Roslan
Published 2013“…Therefore, texture energy features and Fuzzy C-Means clustering method are identified as promising methods of glioma brain tumour detection at an accuracy rate of 76%, 86% and 79% is detected as an abnormal of Tl- Weighted, T2-Weighted and FLAIR images. …”
Get full text
Get full text
Thesis -
9
Hybrid intelligent approach for network intrusion detection
Published 2015“…Feature selection has decreased the features from 41 to 21 features for intrusion detection and later normalization method is employed to perform and reduce the differences among the data. …”
Get full text
Get full text
Get full text
Thesis -
10
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…The benefit of this work indicated that the implementation of a feature selection technique plays an important role in machine learning algorithms to increase the performance of detection.…”
Get full text
Get full text
Thesis -
11
Particle swarm optimization with deep learning for human action recognition
Published 2021“…Also, the current motion target detection algorithms extract features from the relevant object only if the moving object has complex texture features. …”
Get full text
Get full text
Article -
12
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
13
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017“…The performance evaluations of the detection methods are measured by accuracy percentage and processing time. …”
Get full text
Get full text
Monograph -
14
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Optimized intrusion detection mechanism using soft computing techniques
Published 2011“…Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates. …”
Get full text
Get full text
Get full text
Article -
16
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
Get full text
Get full text
Get full text
Article -
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
Published 2016“…GA is used as the method of unlawful behavior detection. Previous research on GA components impact evaluation has identified selection parameter as high potential of increasing GA performance for unlawful behavior detection. …”
Get full text
Get full text
Thesis -
19
-
20
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. …”
Get full text
Get full text
Article
