Results (245)
Search Parameters:
Keyword: DetectionA Circular Invariant Convolution Model-Based Mapping for Multimodal Change Detection
The large and ever-increasing variety of remote sensing sensors used in satellite imagery today explains why detecting changes between identical locations in images that are captured, at two separate times, from heterogeneous capturing systems is a major and challenging recent research problem in the field of satellite imaging for fast and accurate determination of temporal…
Read MoreStudent’s Belief Detection and Segmentation for Real-Time: A Case Study of Indian University
This paper has explored the technology beliefs of university students considering four parameters. We have proposed an automatic belief identification system for academic institutions. For this, we used two different clustering algorithms to segment the student group with different beliefs about the technology. In the Hierarchical Clustering (HC), the Agglomerative approach was followed. The beliefs…
Read MoreMachine Learning for Network Intrusion Detection Based on SVM Binary Classification Model
Recently, the number of connected machines around the worldwide has become very large, generating a huge amount of data either to be stored or to be communicated. Data protection is a concern for all institutions, it is difficult to manage the masses of data that are susceptible to multiple threats. In this work, we present…
Read MoreReal-Time Traffic Sign Detection and Recognition System for Assistive Driving
Road traffic accidents are primarily caused by drivers error. Safer roads infrastructure and facilities like traffic signs and signals are built to aid drivers on the road. But several factors affect the awareness of drivers to traffic signs including visual complexity, environmental condition, and poor drivers education. This led to the development of different ADAs…
Read MoreA Support Vector Machine Based Technique for Fault Detection in A Power Distribution Integrated System with Renewable Energy Distributed Generation
The integration of renewable energy distributed generation (REDG) into the energized distribution power grid has become more popular in recent years. This has been escalated by the general global energy shortages. The REDG has proven to be effective for energy sustainability and reliability. However, there are technical challenges which arise from integrating REDG into the…
Read MoreNonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection
Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…
Read MoreFraud Detection Call Detail Record Using Machine Learning in Telecommunications Company
Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…
Read MoreRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreA Survey on Image Forgery Detection Using Different Forensic Approaches
Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreAlternative Real-time Image-Based Smoke Detection Algorithm
Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…
Read MoreIntrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…
Read MoreA Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques
Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…
Read MoreCombination of Salient Object Detection and Image Matching for Object Instance Recognition
Object Instance Recognition aims to classify objects specifically and usually use a single reference image. It is possible to be used in many applications such as visual search, information retrieval and augmented reality. However, various things affect the appearance of the objects, which makes the recognition process harder, especially if a single reference image is…
Read MoreApproach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection
Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…
Read MoreA Systematic Literature Review of Vessel Anomaly Behavior Detection Methods Based on Automatic Identification System (AIS) and another Sensor Fusion
The high flow of vessel traffic affects the difficulty of monitoring vessel in the middle of the sea because of limited human visibility, occurrence of vessel accidents at the sea and other illegal activities that illustrate abnormal vessel behavior such as oil bunkering, piracy, illegal fishing and other crimes that will continue and will certainly…
Read MoreEnhancing an SDN Architecture with DoS Attack Detection Mechanisms
A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…
Read MoreSensor Based on-the-go Detection of Macro Nutrients for Agricultural Crops
Agriculture, being the vital sector, contributes to India’s GDP by 18%. It is necessary to enhance the production in this sector with minimal need of resources to get the good yield of crops. It in turn boosts up the necessity of automation in the field of agriculture. This paper discusses about the experimental study which…
Read MoreFuzzy Modelling using Firefly Algorithm for Phishing Detection
A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm…
Read MoreEKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection
Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…
Read MoreMelanoma detection using color and texture features in computer vision systems
All forms of skin cancer are becoming widespread. These forms of cancer, and melanoma in particular, are insidious and aggressive and if not treated promptly can be lethal to humans. Effective treatment of skin lesions depends strongly on the timeliness of the diagnosis: for this reason, artificial vision systems are required to play a crucial…
Read MoreLogic Error Detection System based on Structure Pattern and Error Degree
The importance of programming skills has increased with advances in information and communication technology (ICT). However, the difficulty of learning programming is a major problem for novices. Therefore, we propose a logic error detection algorithm based on structure patterns, which are an index of similarity based on abstract syntax trees, and error degree, which is…
Read MoreDevelopment of Wavelet-Based Tools for Event Related Potentials’ N400 Detection: Application to Visual and Auditory Vowelling and Semantic Priming in Arabic Language
Neurological signals are generally very weak in amplitude and strongly noisy. As a result, one of the major challenges in neuroscience is to be able to eliminate noise and thus exploit the maximum amount of information contained in neurological signals (EEG…). In this paper, we aimed at studying the N400 wave of the Event-Related Potentials…
Read MoreInvestigating The Detection of Intention Signal During Different Exercise Protocols in Robot-Assisted Hand Movement of Stroke Patients and Healthy Subjects Using EEG-BCI System
Improving the hand motor skills in post-stroke patients through rehabilitation based on movement intention derived signals from the brain in conjunction with robot-assistive technologies are explored. The experimental work is conducted using Electroencephalogram based Brain-Computer Interface (EEG-BCI) system and the AMADEO hand rehabilitation robotic device. Two protocols using visual-cues and then using a 2-Dimensional (2D)…
Read More
