Search Results - detection based techniques

Search alternatives:

Refine Results
  1. 1

    Feature based face detection for unconstrained images by Tioh, Keat Soon

    Published 2021
    “…Face detection utilises two main methods; feature based and image based methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Review on feature selection and ensemble techniques for intrusion detection system by Torabi, Majid, Udzir, Nur Izura, Abdullah @ Selimun, Mohd Taufik, Yaakob, Razali

    Published 2021
    “…We then analyze and discuss a variety of IDS-based machine learning techniques with various detection models (single classifier-based or ensemble-based), to illustrate their significance and success in the intrusion detection area. …”
    Get full text
    Get full text
    Article
  3. 3

    Partial discharge signal measurement based on stand-alone and hybrid detection technique for power transformer by Jalil M.A.A., Rosmi A.S., Rohani M.N.K.H., Isa M., Auni W.N., Abdullah A.Z., Aizam M.T.

    Published 2023
    “…The hybrid detection technique is based on combining two or more stand-alone detection technique. …”
    Article
  4. 4

    A comparison of different technique in flow based anomaly detection by Salah, Mohammad

    Published 2017
    “…Our proposed method detect anomaly by using alpha profiling technique and by utilizing a group of filtered, feature selection techniques based on Consistency and Correlation has eliminated the inappropriate features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Code clone detection model: a SWOT analysis perspective by Mubarak-Ali, Al-Fahim, Rahiwan Nazar, Romli, Nilam Nur, Amir Sjarif

    Published 2018
    “…Therefore, various code clone detection techniquees such as text based comparison technique, token based comparison technique, tree based comparison technique, metric based comparison technique and graph based comparison technique have been proposed to detect code clone. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Computational Intelligence based techniques for islanding detection of distributed generation in distribution network: A review by Laghari, J.A., Mokhlis, Hazlie, Karimi, M., Bakar, Ab Halim Abu, Mohamad, H.

    Published 2014
    “…Up to now, various islanding detection technique based on communication, passive, active and hybrid methods have been proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Code clone detection using string based tree matching technique by Wahid, Norfaradilla

    Published 2008
    “…There are many code clone detection techniques that can be found nowadays which generally can be group into string based, token based, tree based and semantic based. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparative study between signature-based and anomaly-based network intrusion detection system (SBNIDS and ABNIDS) by Chiadighikaobi, Ikenna Rene

    Published 2015
    “…On the other hand, Anomaly-based detection techniques which is a behaviour techniques, detects the abnormal behaviour in a computer systems and networks. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9
  10. 10

    Implementing PCA-Based Fault Detection System Based on Selected Imported Variables for Continuous-Based Process by Siti Nur Liyana, Ahamd

    Published 2013
    “…Here, in this thesis was to proposed new technique which was by implementing PCA-based fault detection system based on selected imported variables for continuous-based process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Three phase control for PWM-switchedautotransformer voltage-SAG compensator based on phase angle analysis by Mansor M., Rahim N.A.

    Published 2023
    “…Presented is a three-phase PWM-switched autotransformer voltage-sag compensator that is based on AC-AC converter and that uses the proposed three phase controller based on Phase Angle Analysis as the detection technique. …”
    Article
  12. 12

    Metric-based code smell detection technique for python software by Leeman, Samaila Ja'afaru

    Published 2018
    “…This research proposes an enhanced metric-based technique named PySTect that extracts structural information from parsed models of any version of Python software and translates them into metrics for detection of code smells. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Vision-Based Human Detection Techniques: A Descriptive Review by Sumit, S.S., Rambli, D.R.A., Mirjalili, S.

    Published 2021
    “…Secondly, various pros and cons of such techniques are discussed. Then, an investigation has been conducted and reported based on the state-of-the-art human detection descriptors (e.g. …”
    Get full text
    Get full text
    Article
  14. 14

    Backdoor attack detection based on stepping stone detection approach by Al-Minshid, Khalid Abdulrazzaq Abdulnabi

    Published 2014
    “…This study contributes to the field by extending the application of SSD-based techniques, which are usually used in SSD-based environments only, into backdoor attack detection environments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhanced mobile malware detection using intersection attributes technique by Ismail, Najiahtul Syafiqah

    Published 2022
    “…The current detection technique generates high false alarm rates, making the detection technique less effective in detecting the permission-based attack. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…These machine learning algorithms develop a detection model in a training phase. This paper compares different supervised algorithms for the anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Wavelet-based sensing technique in cognitive radio network by Mohamad, Mas Haslinda, Zamri, Nurusolihah, Ibrahim, Nor Khairiah

    Published 2023
    “…The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
    Get full text
    Get full text
    Get full text
    Article