Search Results - (( java application learning algorithm ) OR ( security classification search algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Fingerprint classification : a BI-resolution approach to singular point extraction by Leong, Chung Ern

    Published 2004
    “…The coarser level is used to estimate the position of singular points. The algorithm will only search for singular points in the finer level in a particular region if and only if there is a hit. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Camera coverage prioritization to support security monitoring by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2017
    “…The product of the classification is known as Risk Map. According to the generated multi-level risk map, a greedy algorithm optimization is applied to locate the local maxima among the search domain. …”
    Get full text
    Get full text
    Article
  14. 14

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Secure Access To Authorized Resources Based On Fingerprint Authentication by Elmadani, Ahmed Baba

    Published 2003
    “…The security is maintained and enhanced by adding a public key system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20