Search Results - (( java application optimization algorithm ) OR ( rule detection system algorithm ))

Refine Results
  1. 1

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  2. 2

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Car plate detection system by Gunasegaran, Krishnan

    Published 2005
    “…Finally, the location of the car plate is located using rule based algorithms. The conditions are set as rule and the system detects the car plate if the condition exists. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm by Htike@Muhammad Yusof, Zaw Zaw, Nyein Naing, Wai Yan

    Published 2016
    “…This paper proposes auto encoder neural network for compressing of high dimensional sensory data and classification using Fuzzy Unordered Rule Induction Algorithm (FURIA) with emphasis on detection and isolation of incipient faults. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
    Get full text
    Get full text
    Article
  7. 7

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…The advisory system algorithm used process history based method and presented by rule-based approach. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…In this paper, the authors built Hybrid Intrusion Detecting System combines misuse detection system with anomaly detection system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    On equivalence of FIS and ELM for interpretable rule-based knowledge representation by Wong S.Y., Yap K.S., Yap H.J., Tan S.C., Chang S.W.

    Published 2023
    “…Classification (of information); Computer aided diagnosis; Fault detection; Fuzzy systems; Knowledge acquisition; Knowledge representation; Learning systems; Matrix algebra; Membership functions; Pattern recognition; Extreme learning machine; Fault detection and diagnosis; Fuzzy if-then rules; Fuzzy inference systems; Fuzzy membership function; Initialization technique; Interpretable rules; Rule based; Fuzzy inference; algorithm; artificial intelligence; artificial neural network; benchmarking; classification; electric power plant; factual database; feedback system; fuzzy logic; machine learning; nerve cell; reproducibility; statistical model; Algorithms; Artificial Intelligence; Benchmarking; Classification; Databases, Factual; Feedback; Fuzzy Logic; Machine Learning; Models, Statistical; Neural Networks (Computer); Neurons; Power Plants; Reproducibility of Results…”
    Article
  15. 15

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Using Heuristic Rules from Sentence Decomposition of Experts' Summaries to Detect Students' Summarizing Strategies by Idris, N., Baba, S., Abdullah, R.

    Published 2008
    “…We developed an algorithm based on the heuristic rules and performed some experiments to evaluate and support the technique proposed.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Approach for detecting lane line boundaries / Mamadou Baldeh by Baldeh, Mamadou

    Published 2020
    “…Next, considering the inevitable limitations that exist in the camera-based lane detection system, the system integration methodologies for constructing more robust detection systems are reviewed and analyzed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Detecting the probability of diabetic retinopathy / Nurul Farhanah Khairol Nizar by Khairol Nizar, Nurul Farhanah

    Published 2020
    “…The purpose of this project is to develop a system to help in detecting the possibility of having Diabetic Retinopathy using rule-based system on web-based application. …”
    Get full text
    Get full text
    Thesis