Search Results - detection based techniques
Search alternatives:
- based techniques »
- detection based »
-
1
Feature based face detection for unconstrained images
Published 2021“…Face detection utilises two main methods; feature based and image based methods. …”
Get full text
Get full text
Get full text
Thesis -
2
A Review on feature selection and ensemble techniques for intrusion detection system
Published 2021“…We then analyze and discuss a variety of IDS-based machine learning techniques with various detection models (single classifier-based or ensemble-based), to illustrate their significance and success in the intrusion detection area. …”
Get full text
Get full text
Article -
3
Partial discharge signal measurement based on stand-alone and hybrid detection technique for power transformer
Published 2023“…The hybrid detection technique is based on combining two or more stand-alone detection technique. …”
Article -
4
A comparison of different technique in flow based anomaly detection
Published 2017“…Our proposed method detect anomaly by using alpha profiling technique and by utilizing a group of filtered, feature selection techniques based on Consistency and Correlation has eliminated the inappropriate features. …”
Get full text
Get full text
Get full text
Thesis -
5
Code clone detection model: a SWOT analysis perspective
Published 2018“…Therefore, various code clone detection techniquees such as text based comparison technique, token based comparison technique, tree based comparison technique, metric based comparison technique and graph based comparison technique have been proposed to detect code clone. …”
Get full text
Get full text
Get full text
Article -
6
Computational Intelligence based techniques for islanding detection of distributed generation in distribution network: A review
Published 2014“…Up to now, various islanding detection technique based on communication, passive, active and hybrid methods have been proposed. …”
Get full text
Get full text
Get full text
Article -
7
Code clone detection using string based tree matching technique
Published 2008“…There are many code clone detection techniques that can be found nowadays which generally can be group into string based, token based, tree based and semantic based. …”
Get full text
Get full text
Thesis -
8
Comparative study between signature-based and anomaly-based network intrusion detection system (SBNIDS and ABNIDS)
Published 2015“…On the other hand, Anomaly-based detection techniques which is a behaviour techniques, detects the abnormal behaviour in a computer systems and networks. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
AI-based techniques for DDoS Attack Detection in WSN: a systematic literature review
Published 2020“…The performance of AI techniques-based detection system for DDoS attack in WSN is remarkable.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Implementing PCA-Based Fault Detection System Based on Selected Imported Variables for Continuous-Based Process
Published 2013“…Here, in this thesis was to proposed new technique which was by implementing PCA-based fault detection system based on selected imported variables for continuous-based process. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Three phase control for PWM-switchedautotransformer voltage-SAG compensator based on phase angle analysis
Published 2023“…Presented is a three-phase PWM-switched autotransformer voltage-sag compensator that is based on AC-AC converter and that uses the proposed three phase controller based on Phase Angle Analysis as the detection technique. …”
Article -
12
Metric-based code smell detection technique for python software
Published 2018“…This research proposes an enhanced metric-based technique named PySTect that extracts structural information from parsed models of any version of Python software and translates them into metrics for detection of code smells. …”
Get full text
Get full text
Thesis -
13
Vision-Based Human Detection Techniques: A Descriptive Review
Published 2021“…Secondly, various pros and cons of such techniques are discussed. Then, an investigation has been conducted and reported based on the state-of-the-art human detection descriptors (e.g. …”
Get full text
Get full text
Article -
14
Backdoor attack detection based on stepping stone detection approach
Published 2014“…This study contributes to the field by extending the application of SSD-based techniques, which are usually used in SSD-based environments only, into backdoor attack detection environments. …”
Get full text
Get full text
Get full text
Thesis -
15
Enhanced mobile malware detection using intersection attributes technique
Published 2022“…The current detection technique generates high false alarm rates, making the detection technique less effective in detecting the permission-based attack. …”
Get full text
Get full text
Get full text
Thesis -
16
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
17
Machine learning algorithms in context of intrusion detection
Published 2016“…These machine learning algorithms develop a detection model in a training phase. This paper compares different supervised algorithms for the anomaly-based detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
18
Wavelet-based sensing technique in cognitive radio network
Published 2023“…The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Android: S-Based Technique in Mobile Malware Detection
Published 2018“…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. …”
Get full text
Get full text
Get full text
Article -
20
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article
