Search Results - (( developing security svm algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2

    A hybrid intrusion detection system based on different machine learning algorithms by Atefi, Kayvan, Yahya, Saadiah, Dak, Ahmad Yusri, Atefi, Arash

    Published 2013
    “…There are numerous study in intrusion detection system (IDS) especially with Genetic algorithms (GA) and Support Vector Machine (SVM) but most of them did not get the potential of hybrid SVM using GA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    SVM-based geospatial prediction of soil erosion under static and dynamic conditioning factors by Muhammad Raza, Ul Mustafa, Abdulkadir, Taofeeq Sholagber, Khamaruzaman, Wan Yusof, Ahmad Mustafa, Hashim, M., Waris, Muhammad, Shahbaz

    Published 2018
    “…The study implements four kernel tricks of SVM with sequential minimal optimization algorithm as a classifier for soil erosion susceptibility modeling. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Preliminary analysis of malware detection in opcode sequences within IoT environment by Ahmed, Firas Shihab, Mustapha, Norwati, Mustapha, Aida, Kakavand, Mohsen, Mohd Foozy, Cik Feresa

    Published 2020
    “…This development is opening to many security and privacy challenges that can cause complete network breakdown, bypassed access control or the loss of critical data. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. …”
    Article
  9. 9
  10. 10

    Internet of Things (IoT) intrusion detection by Machine Learning (ML): a review by Dehkordi, Iman Farhadian, Manochehri, Kooroush, Aghazarian, Vahe

    Published 2023
    “…The goal of this study is to show the results of analyzing various classification algorithms in terms of confusion matrix, accuracy, precision, specificity, sensitivity, and f-score to Develop an Intrusion Detection System (IDS) model.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
    Get full text
    Get full text
    Student Project
  12. 12
  13. 13

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…The original FVRS developed only provides verification instead of identification. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Biometric identification and recognition for IRIS using Failure Rejection Rate (FRR) / Musab Ahmed Mohammed Ali Al-Rawi by Mohammed Ali Al-Rawi, Musab Ahmed

    Published 2016
    “…Hence, the objectives of this research are new algorithms development significantly for iris segmentation specifically the proposed Fusion of Profile and Mask Technique (FPM) specifically in getting the actual center of the pupil with high level of accuracy prior to iris localization task, followed by a particular enhancement in iris normalization that is the application of quarter size of an iris image (instead of processing a whole or half size of an iris image) and for better precision and faster recognition with the robust Support Vector Machine (SVM) as classifier. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Malware visualizer: A web apps malware family classification with machine learning by Mohd Zamri, Osman, Ahmad Firdaus, Zainal Abidin, Rahiwan Nazar, Romli

    Published 2021
    “…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A hybrid chromaticity-morphological machine learning model to overcome the limit of detecting newcastle disease in experimentally infected chicken within 36 h by Bakar, Mohd Anif A.A., Ker, Pin Jern, Tang, Shirley G.H., Arman Shah, Fatin Nursyaza, Mahlia, T. M.Indra, Baharuddin, Mohd Zafri, Omar, Abdul Rahman

    Published 2025
    “…This work demonstrates a promising methodology in developing machine learning algorithm using hybrid chromaticity-morphological features for early detection of virus-infected chickens, contributing to the goal of a sustainable and healthier planet.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Near-infrared technique for oil palm fruit grading system by Saeed, Osama Mohamed Ben

    Published 2013
    “…The application software was developed in a MATLAB 7.0 environment, and was used to classify the oil palm FFBs. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…Hence, the objectives of this research are new algorithms development significantly for iris segmentation specifically the proposed Fusion of Profile and Mask Technique (FPM) specifically in getting the actual center of the pupil with high level of accuracy prior to iris localization task, followed by a particular enhancement in iris normalization that is the application of quarter size of an iris image (instead of processing a whole or half size of an iris image) and for better precision and faster recognition with the robust Support Vector Machine (SVM) as classifier. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. A system is developed to predict the risk of users based on their behaviour when they are online using real-life behavioural data obtained from a private university’s 207 undergraduates. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article