Search Results - (( web application solar algorithm ) OR ( _ ((relation based) OR (detection based)) algorithm ))*
Search alternatives:
- application solar »
- web application »
- solar algorithm »
- detection based »
- relation based »
-
1
Interpolation and Extrapolation Techniques Based Neural Network in Estimating the Missing Ionospheric TEC Data
Published 2024Proceedings Paper -
2
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
Get full text
Get full text
Thesis -
3
-
4
Neural network algorithm-based fall detection modelling
Published 2020“…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
Get full text
Get full text
Get full text
Article -
5
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
6
Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm
Published 2016“…This paper underlines the issues related with dirty data, detection of duplicatein email column. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
9
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…Furthermore, this paper also discusses the challenges and the potential research for future work with relate of the genetic algorithm. This research paper can be used as a reference and guidance for further study on mobile botnet detection techniques.…”
Proceedings Paper -
10
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…To adaptively switches between the two algorithms, an adaptive switching algorithm based on a Generalized Likelihood Ratio Test (GLRT) is proposed. …”
Get full text
Get full text
Thesis -
11
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…In this project, a wearable sensor-based fall detection system using a machine-learning algorithm had been developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…Microarray-based cancer biomarker detection is one of the popular trends for cancer classification. …”
Get full text
Get full text
Get full text
Article -
13
Accuracy and performance analysis for classification algorithms based on biomedical datasets
Published 2021“…Lazy based k-nearest neighbors (IBK) algorithm, and Rules-based OneR algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The proposed algorithm considered features based on its level of importance where weight given based on number of features involved in the sample. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
16
A simple model-free butterfly shape-based detection (BSD) method integrated with deep learning CNN for valve stiction detection and quantification
Published 2020“…In most methods for shape-based stiction detection, they rely heavily on the traditional controller output (OP) and process variable (PV) plot (i.e. …”
Get full text
Get full text
Article -
17
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
18
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…There are various approaches used to classify human activities for fall detection. Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
19
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…The most common method of detecting malware relies on signature-based detection. …”
Get full text
Get full text
Thesis -
20
Bot detection using machine learning algorithms on social media platforms
Published 2021“…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper
