Search Results - (( vr application based algorithm ) OR ( its ((selection based) OR (detection based)) algorithm ))
Search alternatives:
- application based »
- detection based »
- vr application »
-
1
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
2
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
3
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
4
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
Get full text
Get full text
Article -
5
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The proposed algorithm considered features based on its level of importance where weight given based on number of features involved in the sample. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Evaluation of feature selection algorithm for android malware detection
Published 2018“…Proposed algorithm applied considers the feature based on its level of importance. …”
Get full text
Article -
7
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The reliability of VR supports various variations in learning, including learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The proposed algorithm has been applied to detect outliers in the high dimensional data. …”
Get full text
Get full text
Thesis -
11
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
12
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…Two main improvements were included into the original SSA algorithm to alleviate its drawbacks and adapt it for feature selection problems. …”
Get full text
Get full text
Article -
13
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
Get full text
Get full text
Get full text
Thesis -
14
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
15
A Review on feature selection and ensemble techniques for intrusion detection system
Published 2021“…Selection of the most relevant features in data has been proven to increase the efficiency of detection in terms of accuracy and computational efficiency, hence its important role in the design of an anomaly-based IDS. …”
Get full text
Get full text
Article -
16
-
17
Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network
Published 2013“…Then, the number and place of cluster heads are determined in base station by using genetic algorithm based on chaotic. …”
Get full text
Get full text
Article -
18
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
19
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…In this research, technique selection is done by doing some literature review to find the best one and also studying about the algorithm of each technique has. …”
Get full text
Get full text
Thesis -
20
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…The approach is based on optimization of selected test case from test suite T. …”
Get full text
Get full text
Get full text
Article
