Search Results - (( java application optimization algorithm ) OR ( rule detection system algorithm ))
Search alternatives:
- application optimization »
- java application »
- system algorithm »
- rule detection »
-
1
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
2
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
3
Car plate detection system
Published 2005“…Finally, the location of the car plate is located using rule based algorithms. The conditions are set as rule and the system detects the car plate if the condition exists. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm
Published 2016“…This paper proposes auto encoder neural network for compressing of high dimensional sensory data and classification using Fuzzy Unordered Rule Induction Algorithm (FURIA) with emphasis on detection and isolation of incipient faults. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Compressing and improving fuzzy rules using genetic algorithm and its application to fault detection
Published 2023Subjects: “…Fault Detection…”
Conference Paper -
6
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
7
Development of a rule-based fault diagnostic advisory system for precut fractionation column
Published 2005“…The advisory system algorithm used process history based method and presented by rule-based approach. …”
Get full text
Get full text
Thesis -
8
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…In this paper, the authors built Hybrid Intrusion Detecting System combines misuse detection system with anomaly detection system. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
On equivalence of FIS and ELM for interpretable rule-based knowledge representation
Published 2023“…Classification (of information); Computer aided diagnosis; Fault detection; Fuzzy systems; Knowledge acquisition; Knowledge representation; Learning systems; Matrix algebra; Membership functions; Pattern recognition; Extreme learning machine; Fault detection and diagnosis; Fuzzy if-then rules; Fuzzy inference systems; Fuzzy membership function; Initialization technique; Interpretable rules; Rule based; Fuzzy inference; algorithm; artificial intelligence; artificial neural network; benchmarking; classification; electric power plant; factual database; feedback system; fuzzy logic; machine learning; nerve cell; reproducibility; statistical model; Algorithms; Artificial Intelligence; Benchmarking; Classification; Databases, Factual; Feedback; Fuzzy Logic; Machine Learning; Models, Statistical; Neural Networks (Computer); Neurons; Power Plants; Reproducibility of Results…”
Article -
15
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Moreover, the algorithm used for rule-based expert system is forward chaining method. …”
Get full text
Get full text
Student Project -
16
Using Heuristic Rules from Sentence Decomposition of Experts' Summaries to Detect Students' Summarizing Strategies
Published 2008“…We developed an algorithm based on the heuristic rules and performed some experiments to evaluate and support the technique proposed.…”
Get full text
Get full text
Article -
17
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
Published 2014Get full text
Get full text
Conference or Workshop Item -
18
Approach for detecting lane line boundaries / Mamadou Baldeh
Published 2020“…Next, considering the inevitable limitations that exist in the camera-based lane detection system, the system integration methodologies for constructing more robust detection systems are reviewed and analyzed. …”
Get full text
Get full text
Thesis -
19
-
20
Detecting the probability of diabetic retinopathy / Nurul Farhanah Khairol Nizar
Published 2020“…The purpose of this project is to develop a system to help in detecting the possibility of having Diabetic Retinopathy using rule-based system on web-based application. …”
Get full text
Get full text
Thesis
