Search Results - (( java implementation path algorithm ) OR ( rate detection learning algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…These machine learning algorithms develop a detection model in a training phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  11. 11

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…To achieve this, we measured the performance of three deep learning algorithms for normal and abnormal detection of IDS, and a comparison was made to select the best performance of the deep learning algorithm for detection in IDS, such as RNN, DBN and CNN. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  16. 16

    Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat by Selamat, Nur Syuhada

    Published 2021
    “…The benefit of this work indicated that the implementation of a feature selection technique plays an important role in machine learning algorithms to increase the performance of detection.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Anomaly detection in ICS datasets with machine learning algorithms by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Abdul Rahman, Farah Diyana, Tahir, Mohammad

    Published 2021
    “…The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa by Muhd Suberi, Anis Azwani

    Published 2020
    “…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis