Search Results - (( java implementation based algorithm ) OR ( (parameter OR parameters) data detection algorithm ))

Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms by Nur Syahirah, Zulkipli, Siti Zanariah, Satari, Wan Nur Syahidah, Wan Yusoff

    Published 2024
    “…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel by Zamri, Ruzaidi

    Published 2016
    “…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…This study focuses on the parameter estimation and outlier detection for some types of the circular model. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…It provides an increased convergence and globally optimized solutions. The algorithm has been tested using actual customer consumption data from SESB. 10 fold cross validation method is used to confirm the consistency of the detection accuracy. …”
    Conference Paper
  8. 8
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Soft Set Decision/Forecasting System Based on Hybrid Parameter Reduction Algorithm by Mohammed, Mohammed Adam Taheir, Sadiq, Ali Safa, Ruzaini, Abdullah Arshah, Ernawan, Ferda, Mirjalili, Seyedali

    Published 2017
    “…Additionally, data decomposition based on previous algorithms could not achieve better parameter reduction with available domain space. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…However, the internal power parameters (weight and basis) of FLN are initialized at random, causing the algorithm to be unstable. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Sequence-based interaction testing implementation using Bees Algorithm by Mohd Hazli M.Z., Kamal Z. Z., Rozmie R. O.

    Published 2023
    “…T-way strategies is used to generate test data to detect faults due to interaction. In the literature, there are many t-way strategies developed by researchers for the past 10 years. …”
    Conference paper
  16. 16

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…Included are calculation of MLNN topology and parameters and calculation of model confidence intervals (CI) based on two assumptions –whole weight and bias parameters, and last layer parameters. …”
    Get full text
    Conference or Workshop Item
  17. 17

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Hence, the algorithm must overcome the problem of dynamic updates in the internal parameters or counter the concept drift. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar by Mokhtar, Nurul Zafirah

    Published 2016
    “…This unsupervised learning usually leads to undirected knowledge discovery. The cluster detection algorithm searches for clusters of data which are similar to one another by using similarity measures. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…The NTLBO was proposed in this paper as an FSS mechanism; its algorithm-specific, parameter-less concept (which requires no parameter tuning during an optimization) was explored. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20