Search Results - (( java implementation learning algorithm ) OR ( subset detection method algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- subset detection »
- method algorithm »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
2
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…The proposed method combined the improved teaching-learning-based optimisation (ITLBO) algorithm, improved parallel JAYA (IPJAYA) algorithm, and support vector machine. …”
Get full text
Get full text
Get full text
Article -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Experiments demonstrate that ensemble classifier learning method produces better accuracy mining data streams and selecting subset of relevant features comparing other single classifiers. …”
Get full text
Get full text
Thesis -
4
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
5
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The Naïve-Bayes classifier and the proposed feature subset selection algorithm have been shown as efficient techniques for damage detection in engineering materials. …”
Get full text
Get full text
Get full text
Article -
6
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
8
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…In this paper we propose an intrusion detection method that combines Fuzzy Clustering and Genetic Algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Algorithm of face recognition by principal component analysis
Published 2002“…The database is divided into subsets, where each subset represents one of 10 different individuals. …”
Get full text
Get full text
Article -
10
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…The proposed method combined the New Teaching-Learning-Based Optimization Algorithm (NTLBO), Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) NTLBO algorithm with supervised machine learning techniques for Feature Subset Selection (FSS). …”
Get full text
Get full text
Get full text
Article -
11
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
12
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
13
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
14
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The voting average method is used as an aggregation step, and two classifiers—Random Forest (RF) and Support Vector Machine (SVM)—are modified to be used as ML Algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification
Published 2023“…The ant colony optimisation (ACO) algorithm have been used to select feature subset. …”
Get full text
Get full text
Get full text
Thesis -
16
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
17
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
20
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The Correlationbased Feature Selection Evaluator (CfsSubset) algorithm is applied in feature selection process in order to improve the classification process. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
