Search Results - (( data reduction detection algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- reduction detection »
- java application »
- application tree »
- data reduction »
- tree algorithm »
-
1
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
2
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…The model is implemented and tested on the CICDDoS2019 dataset using different data dimensionality reduction test scenarios. The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…Such requirements prevent effective deployments of data reduction techniques. This work is inspired by Perceptually Important Points (PIP) data reduction algorithm due to its superior data reduction ability. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Soft Set Decision/Forecasting System Based on Hybrid Parameter Reduction Algorithm
Published 2017“…Although the decomposition scenario in the previous algorithms detects the reduction, it could not obtain the optimal decision. …”
Get full text
Get full text
Get full text
Article -
10
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…The process of clustering records is affected by the quality of data. The more error-free the data, the more efficient the clustering algorithm, as data errors cause data to be placed in incorrect groups. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
An enhanced soft set data reduction using decision partition order technique
Published 2017“…The decomposition scenario in Rose’s and Kumar’s algorithms detects the reduction, but could not obtain the optimal decision. …”
Get full text
Get full text
Thesis -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The experimental results showed that the accuracy of the algorithm over the NSL-KDD dataset was 99.72%, with a memory reduction of 10%. …”
Get full text
Get full text
Thesis -
14
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…It combines the following algorithms: the first algorithm is New Alert Reduction (NAR) algorithm to remove the redundancy from the alert’s file and reduce the false positives.…”
Get full text
Get full text
Thesis -
15
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
16
Accelerating FPGA-surf feature detection module by memory access reduction
Published 2019“…One of the popular algorithm used is called the Speeded-Up Robust Features (SURF), which realized the scale space pyramid to detect the features. …”
Get full text
Get full text
Get full text
Article -
17
Hybrid test redundancy reduction strategy based on global neighborhood algorithm and simulated annealing
Published 2018“…There are already many works in the literature exploiting the greedy computational algorithms as well as the meta-heuristic algorithms, but no single strategy can claim dominance in terms of test data reduction over their counterparts. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
19
FPGA implementation of CPFSK modulation techniques for HF data communication
Published 2003“…This is proven by comparing with conventional noncoherent detection algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
Published 2016“…Intrusion Detection System (IDS) in general considers a big amount of data that are highly redundant and irrelevant. …”
Get full text
Get full text
Get full text
Article
