Search Results - (( set detection system algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- system algorithm »
- java application »
- set detection »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
-
3
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The aim of the Intrusion Detection System (IDS) is to monitor the network system for any sort of attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost)
Published 2007“…Generally, a large number of features are required to be selected for training purposes of face detection system. Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Previous study by Leong show the useful of CAD system but her study is not fully automated. Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis -
8
Detection and extraction features for signatures images via different techniques
Published 2019“…In this paper, three widely used feature detection algorithms, SURF, BRISK and FAST, these algorithms are compared to calculate the processing time and accuracy for set of signatures correctly. …”
Get full text
Get full text
Conference or Workshop Item -
9
Obstacle Detection And Avoidance System
Published 2018“…The algorithm on how the robot car responses when obstacle is detected is also designed. …”
Get full text
Get full text
Monograph -
10
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Face detection using artificial neural network approach
Published 2007“…The system also applies the adaboost learning algorithm to select a small number of critical visual features from a very large set of potential features. …”
Get full text
Get full text
Article -
12
Enhanced feature selections of Adaboost training for face detection using genetic algorithm
Published 2007“…Experiments on a set of images from BioID face database proved that by using GA to search on a large number of feature types and sets, the proposed technique referred to as GABoost was able to obtain the cascades of boosted classifiers for the face detection system that can give higher detection rates (94.25%), lower false positive rates (55.94%) and less training time (6.68 hours).…”
Get full text
Get full text
Get full text
Thesis -
13
Evaluation of fall detection classification approaches
Published 2012“…An accurate automatic fall detection system can help elderly people be safe in every situation. …”
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
15
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. …”
Get full text
Get full text
Get full text
Article -
16
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Significant discretization technique suit to the Intrusion Detection System (IDS) data need to determine in IDS framework, since IDS data consist of huge records that need to be examined in system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
18
Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system
Published 2024Subjects:Conference Paper -
19
Snake detection system using convolutional neural network / Muhammad Danial Ahmad Tarmizi
Published 2020“…The predictive model success in detecting and classifying the snake. The model achieve 96.89 % of accuracy percentage in training set and 96% of accuracy from testing set. …”
Get full text
Get full text
Thesis -
20
Swarm negative selection algorithm for electroencephalogram signals classification
Published 2009“…Therefore, there is a strong need to automate this process. Such automated systems must rely on robust and effective algorithms for detection and prediction. …”
Get full text
Article
