Search Results - (( developing reduction learning algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- developing reduction »
- application modified »
- reduction learning »
- learning algorithm »
- java application »
-
1
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
2
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
6
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
7
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…So, the application of the theory as part of the learning models was proposed in this thesis. Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
Get full text
Get full text
Thesis -
8
-
9
Computationally efficient sequential learning algorithms for direct link resource-allocating networks
Published 2005“…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
Get full text
Get full text
Article -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
11
-
12
Noise reduction techniques in ECG signal
Published 2023Get full text
Get full text
Get full text
Article -
13
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
14
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The experimental results showed that the accuracy of the algorithm over the NSL-KDD dataset was 99.72%, with a memory reduction of 10%. …”
Get full text
Get full text
Thesis -
15
-
16
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
text::Thesis -
17
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
18
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
Get full text
Get full text
Article -
19
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…Unlike the classical kNN algorithm which is a regression type algorithm, the proposed localisation algorithms utilise machine learning classification for both linear and kernel types. …”
Get full text
Get full text
Thesis -
20
Optimization of neural network architecture using genetic algorithm for load forecasting
Published 2014“…The proposed technique provides a pathway to determine the best ANN architecture, prior to the training and learning process of neural network. Multi-objective algorithm is proposed in this research which optimizes the ANN architecture that leads to enhancement in load forecast accuracy and reduction in the computational cost. …”
Get full text
Get full text
Conference or Workshop Item
