Search Results - (( using detection method algorithm ) OR ( framework implementation using algorithm ))
Search alternatives:
- framework implementation »
- implementation using »
- method algorithm »
- using detection »
- using algorithm »
-
1
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
2
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Using a novel firewall framework designed in this dissertation, an algorithm adapted from research by Yan, Wu, Luo, & Zhang (2013) was used for the P2P identification method. …”
Get full text
Get full text
Thesis -
3
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
4
A Telemedicine Tool Framework For Lung Sounds Classification Using Ensemble Classifier Algorithms
Published 2020“…The overall classification accuracy for the Improved Random Forest algorithm has 99.04%. The telemedicine framework was implemented with the Improved Random Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
6
Overhead view based person counting using deep learning
Published 2022“…Second, the OpenVINO Inference Engine is utilized to optimize the trained models in order to facilitate real-time implementation. Third, the accurate tracking of each detected person is performed using the deep learning based tracking framework, known as DeepSORT. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Multi-sensor fusion based on multiple classifier systems for human activity identification
Published 2019“…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
Get full text
Get full text
Article -
9
-
10
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…Therefore, the proposed framework is proven to be competitive with other established methods and can be used as a complete algorithm.…”
Get full text
Get full text
Get full text
Thesis -
11
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…In the case, where the missing regions of pixels are containing textures, edges, and other image features that are not easily handled by concealment algorithms. It therefore, necessitated to use denoising rather than EC algorithms. …”
Get full text
Get full text
Thesis -
12
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Finally, machine learning statistics based on the support vector machine is implemented to detect the cut transitions. The enhancement of the proposed fast video processing method over existing methods in terms of computational complexity and accuracy is verified. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The classification algorithms such as the Lavenberg-Marquardt (LM), Bayesian regularization (BR), scaled conjugate gradient (SCG) and one model of bag-of-features (BoF) are used in this research. …”
Get full text
Get full text
Thesis -
15
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
16
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…A series of training patterns are constructed by employing between two images.Moreover,the work takes accomplishing maximum robustness and transparency into consideration.HPSO method is used to estimate the multiple parameters involved in the model. …”
Get full text
Get full text
Thesis -
17
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
18
Detection of Yawning and Eye Closure for Monitoring Driver’s Drowsiness
Published 2020“…This project proposes a framework of using only mobile device and cloud services to detect drowsiness in driver and alerting them through audio feedbacks. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Modelling and analysis of sensor fault tolerant control using behavioral approach to systems theory
Published 2015“…State observers are then implemented as the fault detection method in which the discrepancies between the measured values by the sensors and the values of the model are expressed as residuals. …”
Get full text
Get full text
Get full text
Thesis -
20
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…The proposed CHA-IDS utilize best first and greedy stepwise with correlation-based feature selection to determine only significant features needed for the intrusion detection. These features are then tested using six machine learning algorithms to find the best classification method that able to distinguish between an attack and non-attack and then from the best classification method, we devise a rule to be implemented in Tmote Sky. …”
Get full text
Get full text
Article
