Search Results - (( java implementation phase algorithm ) OR ( rate detection techniques algorithm ))

Refine Results
  1. 1

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Consequently, attack detection rate increases and false positive alarm rate minimizes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new approach to highway lane detection by using hough transform technique by Aminuddin, Nur Shazwani, Mat Ibrahim, Masrullizam, Mohd Ali, Nursabillilah, Ahmad Radzi, Syafeeza, Mohd Saad, Wira Hidayat, Darsono, Abdul Majid

    Published 2017
    “…Thus, this algorithm aims to detect the road lanes for three significant parameter operations; vanishing point detection, road width measurements, and Region of Interest (ROI) of the road area, for detection purposes.The techniques used in the algorithm are image enhancement and edges extraction by Sobel filter, and the main technique for lane detection is a Hough Transform. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…However,all such intrusion detection techniques suffer from performance penalties and high false alarm rates. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing by Abd Halim, Shahliza, Abang Jawawi, Dayang Norhayati, Sahak, Muhammad

    Published 2019
    “…The goal of this paper is to propose an enhanced string distance and prioritization algorithm which could reorder the test cases resulting to higher rate of fault detection. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm by Mohd. Zin, Zalhan

    Published 2007
    “…A wide variety of face detection techniques have been proposed over the past decades. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…The experimental results demonstrate that the proposed approach outperforms the existing techniques, with the detection rate of attack and false alarm rates of 95.7265 and 4.2735, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…An efficient IDS uses computational methods as techniques of machine learning (ML) to enhance the rates of detection to obtain the lowest false positive rate, although such rates tend to be reduced by the big amount of irrelevant features as an optimization issue. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm by Jama, Abdirisaq M., Khalifa, Othman Omran, Subramaniam, Nantha Kumar

    Published 2021
    “…For CICIDS dataset, SVM algorithm achieved highest detection rate of 76.47% while decision tree and Naïve Bayes has 63.71% & 41.58% of detection rate, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…The K-means is a modified version of the standard K-means by initializing the value K from the value obtained after data mining using Fuzzy-ART and SNC labeling technique. The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…Experimental results illustrate that RNSA and V-Detector algorithms are suitable for the detection of anomalies, with SVM and KNN producing significant efficiency rates and increase in execution time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Performance analysis of robust road sign identification by Mohd Ali, Nursabillilah

    Published 2013
    “…This study describes performance analysis of a robust system for road sign identification that incorporated two stages of different algorithms. The proposed algorithms consist of HSV color filtering and PCA techniques respectively in detection and recognition stages. …”
    Get full text
    Get full text
    Article
  20. 20

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis