Search Results - (( basic detection packet algorithm ) OR ( data visualisation mining algorithm ))
Search alternatives:
- visualisation mining »
- data visualisation »
- detection packet »
- packet algorithm »
- mining algorithm »
- basic detection »
-
1
-
2
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…Clustering is used to identify the intrinsic grouping of a set of unlabelled data. It can be applied in data mining exploration and statistical data analysis. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
7
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
8
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang
Published 2019“…In conclusion, the present work has demonstrated that cancer genomics data mining and integration through GENIPAC and DeSigN is a viable approach to accelerating the drug development process for oral cancer. …”
Get full text
Get full text
Thesis -
10
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Performance optimization method in OFDM based on majorization and minimization technique
Published 2019“…Phase Noise is considered a remarkable problem which causes significant degradation in detecting packet- based Orthogonal Frequency Division Multiplexing (OFDM) signals. …”
Get full text
Get full text
Get full text
Article -
12
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Usually, it is hard to detect DDoS backscatter from the unlabeled packets, where an expert is needed to analyze every packet manually. …”
Get full text
Get full text
Thesis -
13
Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing
Published 2020“…The second main factor is a multipath fading channel which causes a delay in OFDM signal and results for Inter Symbol Interference Noise (ISI).Basically, phase noise is considered as main problem that causes significant degradation in detecting packet-based OFDM signals. …”
Get full text
Get full text
Thesis -
14
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…After that, this study employs the heatmap method to visualise the PMCC value as a colour version of heat. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Forecasting utility management in UiTMCTKKT using predictive analytics / Nur Sufiah Muhammad Taufik
Published 2025“…In this project we will use the Cross Industry Standard Process for Data Mining (CRISP-DM) framework to mitigate these issues combining predictive analytics with iconic factors such as Holt-Winters and Autoregressive Integrated Moving Average (ARIMA) models. …”
Get full text
Get full text
Thesis
