Search Results - (( java application optimisation algorithm ) OR ( security classification clustering algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Reducing false alarm using hybrid Intrusion Detection based on X-Means clustering and Random Forest classification by Juma, Sundus, Muda, Zaiton, Yassin, Warusia

    Published 2014
    “…This paper proposed a hybrid machine learning approach based on X-Means clustering and Random Forest classification called XM-RF in order to aforementioned drawbacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Global and local clustering soft assignment for intrusion detection system: a comparative study by Mohd Rizal Kadis, Azizi Abdullah

    Published 2017
    “…However, the local clustering approach outperforms the global clustering approach on multi-class classification problem. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security by Pitafi, S., Anwar, T., Dewa Made Widia, I., Yimwadsana, B.

    Published 2023
    “…After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
    Get full text
    Get full text
    Article
  10. 10

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Iris is one of the biometric that widely used in the field of security due to its uniqueness. There are a lot of feature extraction methods and classification methods for iris classification. …”
    Get full text
    Get full text
    Monograph
  12. 12

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…The proposed hybrid approach will be clustering all data into the corresponding group before applying a classifier for classification purposes. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid framework based on neural network MLP and means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…The hardness of network attacks, as well as their complexity, has also increased lately.High false alarm rate is a big issue for majority of researches in this area.To overwhelm this challenge a hybrid learning approach is proposed, employing the combination of K-means clustering and Neural Network Multi-Layer Perceptron (MLP) classification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    KM-NEU: an efficient hybrid approach for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia, Udzir, Nur Izura

    Published 2014
    “…The K-means clustering algorithm is engaged for grouping analogous nodes into k clusters using the similarity measures such as attack and non-attack, whereas the Neural Network Multi-Layer Perceptron classifies the clustered data into detail categories such as R2L, Probing, DoS, U2R and Normal. …”
    Get full text
    Get full text
    Article
  15. 15

    A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…To overwhelm this challenge a hybrid learning approach is proposed, employing the combination of K-means clustering and Neural Network Multi-Layer Perceptron (MLP) classification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean by Lorpunmanee, Siriluck, Abdullah, Abdul Razak

    Published 2007
    “…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
    Get full text
    Article
  18. 18
  19. 19

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  20. 20

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article